The stage the employee initiates upon learning of the compromise is Revocation.
Upon learning of a compromise, the current key should be revoked, and a new key can then be generated.
Certificate generation identifies the public part of a key pair as belonging to a subject, and the subject submits it for signing by the CA as a digital certificate with the appropriate key usage.
Key generation occurs during the initial distribution of the key, or after having revoked one. Expiration and renewal are used for a key pair that has not been revoked or expired after a certain period. A given shelf-life increases security.
Learn more about private key on:
https://brainly.com/question/15346474
#SPJ1