A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help.
To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:
A . keys
B . passwords
C . root CA
D . tokens