ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 54 - CISSP-ISSAP discussion

Report
Export

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?

A.
Key escrow
Answers
A.
Key escrow
B.
Key storage
Answers
B.
Key storage
C.
Key revocation
Answers
C.
Key revocation
D.
Key recovery
Answers
D.
Key recovery
Suggested answer: A
asked 18/09/2024
Ilia Voronkov
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first