Posted by: Pdfprep
Post Date: October 24, 2020
A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak. The security administrator needs to implement a process to ensure that financial transactions will not be compromised if a weak encryption key is found.
Which of the following should the security administrator implement?
A . Entropy should be enabled on all SSLv2 transactions.
B . AES256-CBC should be implemented for all encrypted data.
C . PFS should be implemented on all VPN tunnels.
D . PFS should be implemented on all SSH connections.
Answer: C
Leave a Reply