Which of the following is a recommended method for securely managing encryption keys?
Key escrow
Kerberos
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Network Security Exercises are loading ...