A security technician would like an application to use random salts to generate short lived encryption leys during the secure communication handshake process to increase communication security. Which of the following concepts would BEST meet this goal?
A. Ephemeral keys
B. Symmetric Encryption Keys
C. AES Encryption Keys
D. Key Escrow
Answer: B. Symmetric Encryption Keys
You might also like to view...
Which of the following is a standard document property?
A. author B. date the presentation file was created or changed C. theme D. variant
Which tab and group will allow the insertion of rows and columns in a worksheet?
A. Home tab, Styles group B. Page Layout tab, Page Format group C. Home tab, Cells group D. Page Layout tab, Cells group
A ____ attribute can have only one value. Select one:
A) composite B) simple C) single-valued D) multivalued
A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols.Which of the following summarizes the BEST response to the programmer's proposal?
A. The newly developed protocol will only be as secure as the underlying cryptographic algorithms used. B. New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries. C. A programmer should have specialized training in protocol development before attempting to design a new encryption protocol. D. The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.