An automated vulnerability assessment report indicates the presence of insecure encryption protocols on the web server hosting an online storefront. Further investigation reveals the server is configured to permit the use of algorithms susceptible to decryption attacks. Which of the following recommendations should the security analyst make to enhance the secure transmission of data?
Renew the digital certificates associated with the server, as they might be contributing to the vulnerability.
Perform an immediate update of the web platform software to the most current release to address any underlying vulnerabilities.
Turn off encryption on the server to bypass the complexity of configuring protocols until a permanent solution is devised.
Modify the server configuration to enforce the use of strong encryption algorithms and eliminate support for the outdated and insecure ones.
Adjusting the server configuration to support robust encryption protocols and prohibiting the use of known vulnerable algorithms will directly address the issue highlighted by the vulnerability scanner, enhancing the secure transmission of data on the web server. Removing encryption entirely would leave data transmitted in plain text, vulnerable to eavesdropping and interception. Although updating the web platform and renewing the certificates used for establishing secure connections are important maintenance tasks, neither action remedies the core issue of weak encryption protocols being permitted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are strong encryption algorithms?
Open an interactive chat with Bash
What are outdated and insecure encryption protocols?
Open an interactive chat with Bash
Why is it important to configure strong encryption settings on servers?