An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements? A. Key escrow B. Key storage C. Key revocation D. Key recovery  Suggested Answer: A Community Answer: A This question is in CISSP-ISSAP Information Systems Security Architecture Professional Exam For getting Information Systems Security Architecture Professional (CISSP-ISSAP) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISC. Trademarks, certification & product names are used for reference only and belong to ISC. The website does not contain actual questions and answers from ISC's Certification Exams.
Please login or Register to submit your answer