After issuance a technician becomes aware that some keys were issued to individuals who are not authorized to use them. Which of the following should the technician use to correct this problem?
A.
Recovery agent
B.
Certificate revocation list
C.
Key escrow
D.
Public key recovery