Which of the following would be MOST effective in mitigating this vulnerability?
An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications.
Which of the following would be MOST effective in mitigating this vulnerability?
A . Diffle-Hellman (DH) algorithm
B . Elliptic Curve Cryptography (ECC) algorithm
C . Digital Signature algorithm (DSA)
D . Rivest-Shamir-Adleman (RSA) algorithm
Answer: A
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments