List of questions
Related questions
Question 54 - CISSP-ISSAP discussion
An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?
A.
Key escrow
B.
Key storage
C.
Key revocation
D.
Key recovery
Your answer:
0 comments
Sorted by
Leave a comment first