exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 1 question 54 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 54
Topic #: 1
[All CISSP-ISSAP Questions]

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?

  • A. Key escrow
  • B. Key storage
  • C. Key revocation
  • D. Key recovery
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
4 months, 2 weeks ago
Selected Answer: A
Key escrow involves storing copies of encryption keys with a trusted third party, such as a certificate authority. In this case, if the organization wants to allow the certificate authority access to encrypted data and enable them to create digital signatures on behalf of users, key escrow would provide a mechanism for securely sharing the private key corresponding to each user's public key used for encryption. By having access to these private keys stored in an escrow system maintained by the CA, they could perform actions on behalf of those users while ensuring secure authorization and integrity of cryptographic operations.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago