Pete, an employee, is terminated from the company and the legal department needs documents
from his encrypted hard drive. Which of the following should be used to accomplish this task?
(Select TWO).
A.
Private hash
B.
Recovery agent
C.
Public key
D.
Key escrow
E.
CRL