A company must send sensitive data over a non-secure network via web services. The company suspects that competitors are actively trying to intercept all transmissions. Some of the information may be valuable to competitors, even years after it has been sent. Which of the following will help mitigate the risk in the scenario?

A. Digitally sign the data before transmission
B. Choose steam ciphers over block ciphers
C. Use algorithms that allow for PFS
D. Enable TLS instead of SSL
E. Use a third party for key escrow


Answer: A. Digitally sign the data before transmission

Computer Science & Information Technology

You might also like to view...

Write a nested for statement that initializes each element of t to zero

Consider a two-by-three integer array t.

Computer Science & Information Technology

The feature that enables you to click rapidly through a series of values is called the:

A) text box B) check box C) option button D) spin box

Computer Science & Information Technology

You are troubleshooting a DHCP server, and discover that it is creating excessive network traffic handling DHCP requests. What solution will resolve the issue with minimum resource expenditure?

A. Deploy a second DHCP server with the same scope and load balance requests. B. Increase the DHCP lease period for the scopes configured on the server. C. Reduce the DHCP lease period for the scopes configured on the server. D. Create additional scopes on the DHCP server.

Computer Science & Information Technology

A(n) ____________________ tab inserts a vertical bar at the tab position.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology