Which of the following would be MOST effective in mitigating this vulnerability?

An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications.

Which of the following would be MOST effective in mitigating this vulnerability?
A . Diffle-Hellman (DH) algorithm
B . Elliptic Curve Cryptography (ECC) algorithm
C . Digital Signature algorithm (DSA)
D . Rivest-Shamir-Adleman (RSA) algorithm

Answer: A

Latest CISSP Dumps Valid Version with 981 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments