ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 514 - CISSP discussion

Report
Export

An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?

A.
Diffle-Hellman (DH) algorithm
Answers
A.
Diffle-Hellman (DH) algorithm
B.
Elliptic Curve Cryptography (ECC) algorithm
Answers
B.
Elliptic Curve Cryptography (ECC) algorithm
C.
Digital Signature algorithm (DSA)
Answers
C.
Digital Signature algorithm (DSA)
D.
Rivest-Shamir-Adleman (RSA) algorithm
Answers
D.
Rivest-Shamir-Adleman (RSA) algorithm
Suggested answer: D
asked 18/09/2024
Peter Keijer
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first