Which of the following can be implemented to enable use…

Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys. Which of the
following can be implemented to enable users to share encrypted data while abiding by company policies?

Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys. Which of the
following can be implemented to enable users to share encrypted data while abiding by company policies?

A.
Key escrow

B.
Digital signatures

C.
PKI

D.
Hashing



Leave a Reply 3

Your email address will not be published. Required fields are marked *

three + 20 =


DaveyBoy

DaveyBoy

I don’t see how digital signatures achieves this. It would help for non repudiation but not secure sharing.
PKI would allow them to securely email without giving credentials or the key. It works off of asymmetric encryption where the sender will have the private key and the receiver will automatically have the public key.

Dominus

Dominus

I thought PKI was the answer as well.

Ash

Ash

A Digital Signature Certificate authenticates your identity electronically. … You can use Digital Signature Certificates for the following: For sending and receiving digitally signed and encrypted emails. For carrying out secure web-based transactions, or to identify other participants of web-based transactions.