Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Exam CISSP All Questions
Exam CISSP All Questions

View all questions & answers for the CISSP exam

ISC 2 Credentials CISSP Question # 110 Topic 12 Discussion

CISSP Exam Topic 12 Question 110 Discussion:
Question #: 110
Topic #: 12

An organization recently conducted a review of the security of its network applications. One of the

vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?


A.

Diffle-Hellman (DH) algorithm


B.

Elliptic Curve Cryptography (ECC) algorithm


C.

Digital Signature algorithm (DSA)


D.

Rivest-Shamir-Adleman (RSA) algorithm


Get Premium CISSP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.