An organization received a subpoena requesting access to data that resides on an employee’s computer. The organization uses PKI. Which of the following is the
BEST way to comply with the request?
A.
Certificate authority
B.
Public key
C.
Key escrow
D.
Registration authority
E.
Key recovery agent