ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 227 - CAS-004 discussion

Report
Export

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

A.
Key rotation
Answers
A.
Key rotation
B.
Key revocation
Answers
B.
Key revocation
C.
Key escrow
Answers
C.
Key escrow
D.
Zeroization
Answers
D.
Zeroization
E.
Cryptographic obfuscation
Answers
E.
Cryptographic obfuscation
Suggested answer: E
asked 02/10/2024
Erik-Jan Brul
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first