List of questions
Related questions
Question 514 - CISSP discussion
An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?
A.
Diffle-Hellman (DH) algorithm
B.
Elliptic Curve Cryptography (ECC) algorithm
C.
Digital Signature algorithm (DSA)
D.
Rivest-Shamir-Adleman (RSA) algorithm
Your answer:
0 comments
Sorted by
Leave a comment first