which of the following should the end user protect from compromise?

When using PGP, which of the following should the end user protect from compromise? (Select
TWO).

When using PGP, which of the following should the end user protect from compromise? (Select
TWO).

A.
Private key

B.
CRL details

C.
Public key

D.
Key password

E.
Key escrow

F.
Recovery agent

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *

one × 4 =