A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?
A.
Use the employee’s private key
B.
Use the CA private key
C.
Retrieve the encryption key
D.
Use the recovery agent
Since key escrow retrieves the private key, wouldn’t it be A?
0
0
“symmetric encryption only”. There is no private or public key pair.
0
0
c is correct answer
0
0
Please ignore this.
0
0
Sorry, this is a better explanation:
“Key escrow addresses the possibility that a third party may need to access keys. Under the conditions of key escrow, the keys needed to encrypt/decrypt data are
held in an escrow account and made available if that third party requests them. The third party in question is generally the government, but it could also be an
employer if an employee’s private messages have been called into question.”
0
0