An ethical hacker must transfer logs holding confidential client data to a cloud storage environment. Which approach is the BEST method for preserving confidentiality and evading detection?
Archive the files in an unsecured format and transfer them with a script that uses no encryption
Use disguised filenames and attach them to an email with an embedded link to the final repository
Split the files into multiple parts and upload them using repeated plain-text transmissions
Encrypt the logs with a strong cipher, rename them to appear benign, and send them through an encrypted link
Encrypting with a strong cipher prevents unauthorized access. Renaming the files reduces scrutiny from automated monitoring. Sending them through an encrypted link preserves the data's integrity and confidentiality while in transit. Other methods lack robust encryption, rely on exposed transmissions, or omit measures that lower the chance of interception
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a strong cipher and why is it important for encryption?
Open an interactive chat with Bash
Why is renaming files to appear benign useful in this scenario?
Open an interactive chat with Bash
How does an encrypted link enhance data confidentiality during transmission?