Two users need to securely share encrypted files via email. Company policy prohibits users from sharing
credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share
encrypted data while abiding by company policies?
A.
Key escrow
B.
Digital signatures
C.
PKI
D.
Hashing