1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
14

A network administrator has a domain that includes single location. They want to store a copy of digital certificates with a tru

sted third party. What should be implemented?
Computers and Technology
1 answer:
Nady [450]3 years ago
4 0

Answer: Key escrow

Explanation:

Key escrow is the process of giving custody of the keys to a third party. Key escrow provides a system for recovering encrypted data even if the users lose private keys. Each key stored in an escrow system is conneted to the original user and later on encrypted for security reasons.

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Is phone data used when connected to wifi
finlep [7]
I do not think so, no.
7 0
4 years ago
Please help me with these questions.
schepotkina [342]

the second one is correct

and the 3rd and 4th

8 0
3 years ago
In a presentation, bullets in a text box will do which of the following?
vesna_86 [32]
It will help you present data with concise statements.
8 0
4 years ago
)1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
Darina [25.2K]

Answer: Single  precision

Explanation:

A 1-bit sign, 8-bit exponent, 23-bit fraction and a bias of 127 is used for the single precision binary floating point representation. As, single precision is the smallest change that can be represented as floating point representation is called as precision. It is the computer format number, which occupies 32 bits in the computer memory.

The IEEE standard specify a binary 32 as:

Sign bit- 1 bit

Exponent width- 8 bits

Significant and precision- 24 bits (23 stored as explicitly)

7 0
3 years ago
Other questions:
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • How long before a speech should you begin practicing?
    10·2 answers
  • HURYY PLEASE and please be the right answer!!!with reasoning
    13·1 answer
  • The assignment of numeric codes to characters follows a specific order called a(n) _____.
    15·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • in a deisgn project, what two types of graphics or images is the digital artist respondsible for creating?
    11·1 answer
  • Amazon Web Services and Microsoft Azure are some of the most widely used _______.
    7·1 answer
  • How to delete the last element in array
    15·1 answer
  • Please help!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!