Multiple Choice
Your company uses a cryptographic key system to encrypt tapes. After several years of use and thousands of tapes shipped to off-site locations, an IT audit reveals that encryption keys have been inadvertently stored as ciphertext on file shares to which everyone in the company has read permissions. Which response reflects industry best practice?
A) All data encrypted with the keys exposed as ciphertext should be considered safe.
B) All data encrypted with the keys exposed as ciphertext and not yet sent off-site as an encrypted tape should be re-keyed (decrypted and re-encrypted using a new key) .
C) All data encrypted with the keys exposed as ciphertext should be re-keyed (decrypted and re-encrypted using a new key) .
D) All data encrypted with the keys exposed as ciphertext should be considered safe as ciphertext is very difficult to use.
Correct Answer:

Verified
Correct Answer:
Verified
Q11: You are designing a security solution for
Q12: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1984/.jpg" alt="Click
Q13: You determine that throughput between a server
Q14: Which storage related offering serves as intermediaries
Q15: You need to add an iSCSI host
Q17: The CIO would like to segregate management
Q18: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1984/.jpg" alt="Click
Q19: You have been asked to secure your
Q20: After provisioning a new LUN to a
Q21: Click the Exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1984/.jpg" alt="Click