Which of the following can be implemented to enable use…

Two users need to securely share encrypted files via email. Company policy prohibits users from sharing
credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share
encrypted data while abiding by company policies?

Two users need to securely share encrypted files via email. Company policy prohibits users from sharing
credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share
encrypted data while abiding by company policies?

A.
Key escrow

B.
Digital signatures

C.
PKI

D.
Hashing



Leave a Reply 0

Your email address will not be published. Required fields are marked *