List of questions
Related questions
Question 545 - 312-50v12 discussion
Your company, Encryptor Corp, is developing a new application that will handle highly sensitive user information. As a cybersecurity specialist, you want to ensure this data is securely stored. The development team proposes a method where data is hashed and then encrypted before storage. However, you want an added layer of security to verify the integrity of the data upon retrieval. Which of the following cryptographic concepts should you propose to the team?
A.
Implement a block cipher mode of operation.
B.
a digital signature mechanism.
C.
Suggest using salt with hashing.
D.
Switch to elliptic curve cryptography.
Your answer:
0 comments
Sorted by
Leave a comment first