Multiple Choice
A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable. Which of the following solutions BEST meets all of the architect's objectives?
A) An internal key infrastructure that allows users to digitally sign transaction logs
B) An agreement with an entropy-as-a-service provider to increase the amount of randomness in generated keys.
C) A publicly verified hashing algorithm that allows revalidation of message integrity at a future date.
D) An open distributed transaction ledger that requires proof of work to append entries.
Correct Answer:

Verified
Correct Answer:
Verified
Q233: An organization is in the process of
Q234: A security engineer is attempting to convey
Q235: A company's existing forward proxies support software-based
Q236: Following a recent data breach, a company
Q237: A company contracts a security engineer to
Q239: Given the following code snippet: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg"
Q240: A security engineer is investigating a compromise
Q241: A consulting firm was hired to conduct
Q242: A security engineer is performing an assessment
Q243: A security engineer has implemented an internal