When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:
A . session keys.
B . encryption of data at rest
C . encryption of data in use.
D . ephemeral keys.
Answer: D
Explanation:
Compromising data in use enables access to encrypted data at rest and data in motion. For example, someone with access to random access memory (RAM) can parse that memory to locate the encryption key for data at rest. Once they have obtained that encryption key, they can decrypt encrypted data at rest.