List of questions
Related questions
Question 1352 - CISSP discussion
An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?
A.
Use a Secure Hash Algorithm 256 (SHA-256).
B.
Use a hierarchy of encryption keys.
C.
Use Hash Message Authentication Code (HMAC) keys.
D.
Use Rivest-Shamir-Adleman (RSA) keys.
Your answer:
0 comments
Sorted by
Leave a comment first