List of questions
Related questions
Question 1190 - CISSP discussion
In an IDEAL encryption system, who has sole access to the decryption key?
A.
System owner
B.
Data owner
C.
Data custodian
D.
System administrator
Your answer:
0 comments
Sorted by
Leave a comment first