ExamQuestions.com

Register
Login
Information Systems Security Architecture Professional (CISSP-ISSAP) Exam Questions

ISC

Information Systems Security Architecture Professional (CISSP-ISSAP)

49 / 115

Question 49:

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user`s certificate. Which of the following processes fulfills the above requirements? 

Answer options:

A. Key escrow
B. Key storage
C. Key revocation
D. Key recovery