A company wants to ensure the authenticity, confidentiality, and integrity of its secure communications across its network. What is the BEST method to achieve this?
Increasing the complexity of network passwords
Implementing a Public Key Infrastructure (PKI) system
Applying strict access control lists (ACLs)
Enabling firewall rules for incoming and outgoing traffic
Using a Public Key Infrastructure (PKI) system is the most effective method to ensure the authenticity, confidentiality, and integrity of secure communications across a network. PKI employs a pair of public and private keys to encrypt and decrypt data, along with digital certificates issued and verified by a Certificate Authority (CA), thus maintaining secure transmissions. While other options like access control lists and firewalls are critical to comprehensive network security, they do not directly address the specific needs of data encryption and key management intrinsic to PKI.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Public Key Infrastructure (PKI)?
Open an interactive chat with Bash
How does PKI maintain confidentiality, integrity, and authenticity?
Open an interactive chat with Bash
What is a Certificate Authority (CA) in the context of PKI?