An enterprise with global sites processes and exchanges highly sensitive information that is protected under several countries' arms trafficking laws. There is new information that malicious nation-state-sponsored activities are targeting the use of encryption between the geographically disparate sites. The organization currently employs ECDSA and ECDH with P-384, SHA-384, and AES-256-GCM on VPNs between sites. Which of the following techniques would MOST likely improve the resilience of the enterprise to attack on cryptographic implementation?
A) Add a second-layer VPN from a different vendor between sites.
B) Upgrade the cipher suite to use an authenticated AES mode of operation.
C) Use a stronger elliptic curve cryptography algorithm.
D) Implement an IDS with sensors inside (clear-text) and outside (cipher-text) of each tunnel between sites.
E) Ensure cryptography modules are kept up to date from vendor supplying them.
Correct Answer:
Verified
Q207: A security engineer is attempting to convey
Q208: After a large organization has completed the
Q209: A company is transitioning to a new
Q210: A Chief Security Officer (CSO) is reviewing
Q211: A penetration test is being scoped for
Q213: When reviewing KRIs of the email security
Q214: A company wants to confirm sufficient executable
Q215: During the decommissioning phase of a hardware
Q216: The government is concerned with remote military
Q217: An organization just merged with an organization
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents