CompTIA Security+ SY0-701 Practice Question
A corporation is implementing a system that necessitates a secure method for numerous users to encrypt and decrypt documents using a common key. It is imperative that the method ensures the safety of the key even when dispersed amongst an extensive user base. Which encryption approach is the most suitable for this situation?
Applying a one-way cryptographic hash function to encrypt data.
Implementing asymmetric encryption utilizing distinct and separate keys.
Utilizing a dedicated encryption device for generating and storing keys.
Deploying symmetric encryption with a singular shared secret key.
Using a Key Agreement Protocol to establish a shared secret key among users.