Valid Information-Technology-Management Dumps shared by ExamDiscuss.com for Helping Passing Information-Technology-Management Exam! ExamDiscuss.com now offer the newest Information-Technology-Management exam dumps, the ExamDiscuss.com Information-Technology-Management exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Information-Technology-Management dumps with Test Engine here:
What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?
Correct Answer: C
* Role of a Trusted Third Party: * Trusted third parties, like Certificate Authorities (CAs), validate the correlation between users and public keys. * They ensure secure communication by providing authentication (verifying user identity) and authorization (granting access rights). * Advantages in Disaster Recovery Planning: * Simplifies secure communication during recovery processes. * Provides a trusted mechanism for verifying identities and preventing unauthorized access. * Why Other Options Are Incorrect: * Option A (Monitors enclosures): Not related to public key verification. * Option B (Protects against encrypted attacks): While encryption enhances security, it is not the purpose of a trusted third party. * Option D (Features full-time monitoring): Not a function of trusted third parties like CAs. References: Public Key Infrastructure (PKI) Best Practices - NIST SP 800-32 Role of Trusted Third Parties in Disaster Recovery - Gartner Research