A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols.Which of the following summarizes the BEST response to the programmer's proposal?
A. The newly developed protocol will only be as secure as the underlying cryptographic algorithms used.
B. New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
C. A programmer should have specialized training in protocol development before attempting to design a new encryption protocol.
D. The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.
Answer: B. New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
You might also like to view...
A(n) ________ in VBA begins with an apostrophe
Fill in the blank(s) with correct word
A floppy disk is a non-removable storage device
Indicate whether the statement is true or false
What type of backlighting is also called fluorescent backlighting, and was first used in laptop monitors?
A. LED B. liquid crystal display C. plasma monitor D. CCFL
____ is the functional unit of a computer that stores and retrieves instructions and data.
a. CPU b. Input/output c. Memory d. ALU