ExamGecko
Question list
Search
Search

List of questions

Search

Question 144 - CCAK discussion

Report
Export

To BEST prevent a data breach from happening, cryptographic keys should be:

A.

distributed in public-facing repositories.

Answers
A.

distributed in public-facing repositories.

B.

embedded in source code.

Answers
B.

embedded in source code.

C.

rotated regularly.

Answers
C.

rotated regularly.

D.

transmitted in clear text.

Answers
D.

transmitted in clear text.

Suggested answer: C

Explanation:

Rotating cryptographic keys regularly is a security best practice that helps to mitigate the risk of unauthorized access to encrypted data. When keys are rotated, old keys are retired and replaced with new ones, making any compromised keys useless to an attacker. This process helps to limit the time window during which a stolen key can be used to breach data. Key rotation is a fundamental aspect of key management lifecycle best practices, which include generating new key pairs, rotating keys at set intervals, revoking access to keys, and destroying out-of-date or compromised keys.

Reference The importance of key rotation is supported by various security standards and best practices, including recommendations from the National Institute of Standards and Technology (NIST)1and the Cloud Security Alliance (CSA)23. These sources emphasize the need for periodic renewal and decommissioning of old keys as part of a comprehensive key management strategy.

asked 17/11/2024
Steven Moran
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first