Trusted third parties, like Certificate Authorities (CAs), validate the correlation between users and public keys.
They ensure secure communication by providing authentication (verifying user identity) and authorization (granting access rights).
Advantages in Disaster Recovery Planning:
Simplifies secure communication during recovery processes.
Provides a trusted mechanism for verifying identities and preventing unauthorized access.
Why Other Options Are Incorrect:
Option A (Monitors enclosures): Not related to public key verification.
Option B (Protects against encrypted attacks): While encryption enhances security, it is not the purpose of a trusted third party.
Option D (Features full-time monitoring): Not a function of trusted third parties like CAs.
References:
Public Key Infrastructure (PKI) Best Practices – NIST SP 800-32
Role of Trusted Third Parties in Disaster Recovery – Gartner Research
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit