Key escrow is a(n) ________.

Key escrow is a(n) ________.
A) protocol used to secure communication over the internet
B) safety procedure that allows a trusted party to have a copy of the encryption key
C) device that prevents unauthorized network access
D) encryption algorithm that uses both public and private keys
E) the creation of related public and private keys
Answer :

Leave a Comment