ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 1352 - CISSP discussion

Report
Export

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?

A.
Use a Secure Hash Algorithm 256 (SHA-256).
Answers
A.
Use a Secure Hash Algorithm 256 (SHA-256).
B.
Use a hierarchy of encryption keys.
Answers
B.
Use a hierarchy of encryption keys.
C.
Use Hash Message Authentication Code (HMAC) keys.
Answers
C.
Use Hash Message Authentication Code (HMAC) keys.
D.
Use Rivest-Shamir-Adleman (RSA) keys.
Answers
D.
Use Rivest-Shamir-Adleman (RSA) keys.
Suggested answer: D
asked 18/09/2024
JAVIER MALDONADO
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first