List of questions
Related questions
Question 561 - 312-50v12 discussion
You are the chief security officer at AlphaTech, a tech company that specializes in data storage solutions. Your company is developing a new cloud storage platform where users can store their personal files. To ensure data security, the development team is proposing to use symmetric encryption for data at rest. However, they are unsure of how to securely manage and distribute the symmetric keys to users. Which of the following strategies would you recommend to them?
A.
Use hash functions to distribute the keys.
B.
implement the Diffie-Hellman protocol for secure key exchange.
C.
Use HTTPS protocol for secure key transfer.
D.
Use digital signatures to encrypt the symmetric keys.
Your answer:
0 comments
Sorted by
Leave a comment first