Posted by: Pdfprep
Post Date: July 11, 2021
When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed to implement:
A . session keys.
B . encryption of data at rest.
C . encryption of data in use.
D . ephemeral keys.
Answer: C
Leave a Reply