During a vulnerability scan, a legacy software package was found that uses an outdated encryption scheme that can be brute forced. Which solution addresses the cryptographic threat?
Set up multi-factor authentication for the software
Run frequent vulnerability assessments to track possible intrusions
Use a better cryptographic library and disable outdated protocols
Append an intrusion detection application to log suspicious traffic
Using a robust cryptographic library addresses the main vulnerability by replacing algorithms that can be brute forced with stronger encryption. Monitoring for suspicious traffic does not protect the data exchanges themselves. Enforcing multi-factor authentication affects access control but does not fix the underlying encryption. Frequent assessments uncover risks but do not remove older algorithms from use.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic library?
Open an interactive chat with Bash
What makes outdated encryption schemes vulnerable?
Open an interactive chat with Bash
How does disabling outdated protocols improve security?