Which of the following techniques would MOST likely improve the resilience of the enterprise to attack on cryptographic implementation?

An enterprise with global sites processes and exchanges highly sensitive information that is protected under several countries’ arms trafficking laws. There is new information that malicious nation-state-sponsored activities are targeting the use of encryption between the geographically disparate sites. The organization
currently employs ECDSA and ECDH with P-384, SHA-384, and AES-256-GCM on VPNs between sites.
Which of the following techniques would MOST likely improve the resilience of the enterprise to attack on cryptographic implementation?
A. Add a second-layer VPN from a different vendor between sites.
B. Upgrade the cipher suite to use an authenticated AES mode of operation.
C. Use a stronger elliptic curve cryptography algorithm.
D. Implement an IDS with sensors inside (clear-text) and outside (cipher-text) of each tunnel between sites.
E. Ensure cryptography modules are kept up to date from vendor supplying them.

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

3 thoughts on “Which of the following techniques would MOST likely improve the resilience of the enterprise to attack on cryptographic implementation?

  1. I was originally really wondering about this question, however the answer is (C). Use a stronger elliptic curve cryptography algorithm based upon the organizations current encryption deployment. Elliptic Curve Digital Signature Algorithm (ECDSA) & Elliptic-curve Diffie–Hellman (ECDH)

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.