4.1 List ways in which secret keys can be distributed

Place Order