ExamGecko
Question list
Search
Search

Related questions











Question 538 - 312-50v12 discussion

Report
Export

You are the chief cybersecurity officer at CloudSecure Inc., and your team is responsible for securing a cloudbased application that handles sensitive customer data. To ensure that the data is protected from breaches, you have decided to implement encryption for both data-at-rest and data-in-transit. The development team suggests using SSL/TLS for securing data in transit. However, you want to also implement a mechanism to detect if the data was tampered with during transmission. Which of the following should you propose?

A.
Implement IPsec in addition to SSL/TLS.
Answers
A.
Implement IPsec in addition to SSL/TLS.
B.
Qswitch to using SSH for data transmission.
Answers
B.
Qswitch to using SSH for data transmission.
C.
Use the cloud service provider's built-in encryption services.
Answers
C.
Use the cloud service provider's built-in encryption services.
D.
Encrypt data using the AES algorithm before transmission.
Answers
D.
Encrypt data using the AES algorithm before transmission.
Suggested answer: A

Explanation:

SSL/TLS is a protocol that provides encryption and authentication for data in transit between a client and a server. However, SSL/TLS does not provide any protection against data tampering, which is the alteration, deletion, or insertion of data without authorization or proper validation. Data tampering can compromise the integrity and accuracy of the data, and potentially lead to breaches or fraud. To detect and prevent data tampering, you should implement IPsec in addition to SSL/TLS. IPsec is a protocol that provides encryption, authentication, and integrity for data in transit at the network layer. IPsec uses cryptographic mechanisms, such as digital signatures and hash-based message authentication codes (HMACs), to verify the identity of the sender and the receiver, and to ensure that the data has not been modified during transmission. IPsec can also provide replay protection, which prevents an attacker from retransmitting old or duplicate packets. By combining SSL/TLS and IPsec, you can achieve a higher level of security and reliability for your cloud-based application.Reference:

EC-Council CEHv12 Courseware Module 18: Cryptography, page 18-20

EC-Council CEHv12 Courseware Module 19: Cloud Computing, page 19-29

A comprehensive guide to data tampering

Tamper Detection

asked 18/09/2024
zulmaidi mr
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first