Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?
A. The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.
B. Systems can only store a certain number of keys and could be unable to generate new keys for communication.
C. It increases the risk of duplicate keys existing for the key space of the algorithm.
D. The risk of weaker keys being generated increases as the number of keys stored increases.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.