ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 131 Topic 14 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 131 Topic 14 Discussion

312-50v12 Exam Topic 14 Question 131 Discussion:
Question #: 131
Topic #: 14

You are the chief security officer at AlphaTech, a tech company that specializes in data storage solutions. Your company is developing a new cloud storage platform where users can store their personal files. To ensure data security, the development team is proposing to use symmetric encryption for data at rest. However, they are unsure of how to securely manage and distribute the symmetric keys to users. Which of the following strategies

would you recommend to them?


A.

Use hash functions to distribute the keys.


B.

implement the Diffie-Hellman protocol for secure key exchange.


C.

Use HTTPS protocol for secure key transfer.


D.

Use digital signatures to encrypt the symmetric keys.


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.