When using PGP, which of the following should the end user protect from compromise? (Select TWO).

When using PGP, which of the following should the end user protect from compromise? (Select TWO).




A. Private key
B. CRL details
C. Public key
D. Key password
E. Key escrow
F. Recovery agent

Answer:

A
D


Learn More :