which of the following should the end user protect from compromise?

When using PGP, which of the following should the end user protect from compromise? (Select
TWO).

When using PGP, which of the following should the end user protect from compromise? (Select
TWO).

A.
Private key

B.
CRL details

C.
Public key

D.
Key password

E.
Key escrow

F.
Recovery agent



Leave a Reply 0

Your email address will not be published. Required fields are marked *

2 × 3 =