List of questions
Related questions
Question 227 - CAS-004 discussion
A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?
A.
Key rotation
B.
Key revocation
C.
Key escrow
D.
Zeroization
E.
Cryptographic obfuscation
Your answer:
0 comments
Sorted by
Leave a comment first