During a vulnerability scan, a legacy software package was found that uses an outdated encryption scheme that can be brute forced. Which solution addresses the cryptographic threat?
Append an intrusion detection application to log suspicious traffic
Set up multi-factor authentication for the software
Run frequent vulnerability assessments to track possible intrusions
Use a better cryptographic library and disable outdated protocols
Using a robust cryptographic library addresses the main vulnerability by replacing algorithms that can be brute forced with stronger encryption. Monitoring for suspicious traffic does not protect the data exchanges themselves. Enforcing multi-factor authentication affects access control but does not fix the underlying encryption. Frequent assessments uncover risks but do not remove older algorithms from use.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic library, and why is it important?
Open an interactive chat with Bash
Why are outdated encryption schemes vulnerable to brute-force attacks?
Open an interactive chat with Bash
What does it mean to 'disable outdated protocols,' and how is it done?