George, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following could be used to accomplish this task?

  • Public key
  • Private hash
  • CRL
  • Recovery agent

CompTIA Security+ SY0-401
  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
    • This question is filed here
  • Cryptography