ISSC 422 Week 5 Cyber Security Public Key Infrastructure Discussion
Question Description
I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
Topic: Public Key Infrastructure
Which one of the following statements is most correct about data encryption as a method of protecting data?
It should sometimes be used for password files
It is usually easily administered
It makes few demands on system resources
- It requires careful key Management
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."