Question 49:
An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user`s certificate. Which of the following processes fulfills the above requirements?
Answer options:
A. Key escrow B. Key storage C. Key revocation D. Key recovery