When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
A.
Private key
B.
CRL details
C.
Public key
D.
Key password
E.
Key escrow
F.
Recovery agent
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
When using PGP, which of the following should the end user protect from compromise? (Select
TWO).
A.
Private key
B.
CRL details
C.
Public key
D.
Key password
E.
Key escrow
F.
Recovery agent