In human terms, this "final key" often takes the form of a password. The password is used to gain access to the place where the "real key" is stored.
In the computer security world, we use cryptographic algorithms to perform the security operations. But some of these algorithms can't just use passwords as keys, because they require specialized large numbers to make the math work. Since we humans aren't typically capable of remembering 256 digit cryptographic keys, we need to use storage devices to hold them. And because we don't want just anyone who gets ahold of that storage device to have a copy of the keys, we usually protect these secret keys by encrypting them.
But now we're back to the same problem: how do we encrypt these secret keys if we still can't remember a key? Instead of remembering a key, we remember a password, and use an algorithm called a Key Derivation Function to turn our password into a cryptographic key. This key is then used to decrypt the actual secret key needed to access the sensitive data.
In the physical world, this is similar to placing your car keys in a safe. You'd have to know the combination to the safe in order to get the car keys, the combination lock turns your combination (your password) into mechanical position of pins and disks (the physical manifestation of the key required to throw the bolt,) then you could open the safe and get the car keys. Once you have the car keys, you can unlock the car and drive away.
And for very high security keys, such as the master keys for a debit card network, or the root certificate keys for a Certificate Authority, it is not uncommon to keep the keys or a password printed on a piece of paper and locked in a safe. Only the data owner knows the combination. Another choice with cryptography is to split the key into three or more parts, requiring three people to get together to reassemble the key.