Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?
A . The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.
B . Systems can only store a certain number of keys and could be unable to generate new keys for communication.
C . It increases the risk of duplicate keys existing for the key space of the algorithm.
D . The risk of weaker keys being generated increases as the number of keys stored increases.

Answer: A

Leave a Reply

Your email address will not be published.