Posted by: Pdfprep
Post Date: December 12, 2020
Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?
A . The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.
B . Systems can only store a certain number of keys and could be unable to generate new keys for communication.
C . It increases the risk of duplicate keys existing for the key space of the algorithm.
D . The risk of weaker keys being generated increases as the number of keys stored increases.
Answer: A
Leave a Reply