Which of the following processes fulfills the above requirements?

An organization wants to allow a certificate authority to gain access to the encrypted data and
create digital signatures on behalf of the user. The data is encrypted using the public key from a
user’s certificate. Which of the following processes fulfills the above requirements?

An organization wants to allow a certificate authority to gain access to the encrypted data and
create digital signatures on behalf of the user. The data is encrypted using the public key from a
user’s certificate. Which of the following processes fulfills the above requirements?

A.
Key escrow

B.
Key storage

C.
Key revocation

D.
Key recovery

Explanation:
Key escrow allows the certificate authority (CA) to gain access to all the information
that is encrypted using the public key from a user’s
certificate, as well as create digital signatures on behalf of the user.



Leave a Reply 0

Your email address will not be published. Required fields are marked *