COMPUTER FUNDAMENTALS

EMERGING TRENDS IN COMPUTING

CLOUD COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
WHICH OF THE FOLLOWING IS NOT A PHASE OF KEY MANAGEMENT
A
CREATION
B
VERIFICATION
C
MONITORING
D
DESTRUCTION
Explanation: 

Detailed explanation-1: -Key Management is the process of putting certain standards in place to ensure the security of cryptographic keys in an organization. Key Management deal with the creation, exchange, storage, deletion, and refreshing of keys. They also deal with the members access of the keys.

Detailed explanation-2: -Symmetric. The symmetric encryption method uses a single key both to encrypt and decrypt the data. Asymmetric. The second major encryption method is asymmetric encryption, also sometimes known as public key encryption. Hashing.

Detailed explanation-3: -Awareness of current standards. Prevent individual total access. Plan for the future. Centralize control. Comprehensive logging. Integrate and unify. Consolidate systems. 06-Oct-2017

There is 1 question to complete.