A company wants to protect sensitive information when it is transferred between different parts of its infrastructure. Which measure is the BEST choice to maintain confidentiality if attackers monitor the traffic?
Use a shared secret for transfers and implement an access list on each node
Establish an encrypted tunnel that periodically generates new session keys
Stop transmissions until an assessment engine finishes scanning each packet
Rely on open connections and log activities for post-event detection
Ephemeral encryption keys that renew help limit exposure if one key is taken. Relying on a single shared secret or blocking transmissions for an extended inspection can compromise efficiency and may not stop eavesdropping. Leaving connections open while depending on logging is reactive and does not prevent unauthorized viewing of data in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an encrypted tunnel, and how does it maintain confidentiality?
Open an interactive chat with Bash
What are ephemeral encryption keys, and why are they important?
Open an interactive chat with Bash
How does session key renewal enhance the security of data transfers?