<span>The Update Anomaly occurs when more than one occurrence of a specific data item in a database exists. </span>Update Anomaly<span> happens when one or more instances of doubled data is </span>updated<span>, but not all. It is </span><span>is a data discrepancy which resulted from data that is </span><span>no longer needed or useful.</span>.
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
LAN (Local Area Network)
<span>Basically, to be precise, Intranet is
an extension of LAN in which IP services like HTTP, TCP/IP and several other
standard protocols are added. Intranet is a private internet network that is
used to add internet like services in an internal LAN.</span>
Answer:
The matrix theory is used by hill cipher.
Explanation:
Th technique which uses matrix theory is hill cipher technique.
Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.
For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.