Which of the following allows an organization to store a sensitive PKI component with a trusted
third party?
A.
Trust model
B.
Public Key Infrastructure
C.
Private key
D.
Key escrow
Which of the following allows an organization to store a sensitive PKI component with a trusted
third party?
Which of the following allows an organization to store a sensitive PKI component with a trusted
third party?
A.
Trust model
B.
Public Key Infrastructure
C.
Private key
D.
Key escrow