- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: A company is implementing asymmetric key cryptography for the emails of their employees. The company is concerned that employees may lose their private keys and will not be able to decrypt their messages. Which of the following is the best solution to this problem?
A: Key escrow
Explanation: Key escrows are trusted third parties that hold private keys for individuals or companies. If the private key is lost, the owner can verify their identity to the key escrow and have their key restored.Answer C is incorrect. Zeroization is the process by which cryptologic systems are cleared of all keying materials, plaintext, ciphertext, control parameters, and sometimes even their software and firmware.Answer B is incorrect. Key encapsulation is the process of wrapping an encryption key inside a data payload using some combination of symmetric and asymmetric encryption to provide for secure in-band key exchange.Answer A is incorrect. Data remanence is defined as the data that remains on or in a device or system after it has been shut down, powered off, or even physically removed from the larger information system it is a part of.
- Get link
- X
- Other Apps
Comments
Post a Comment