A company wants to ensure the authenticity, confidentiality, and integrity of its secure communications across its network. What is the BEST method to achieve this?
Implementing a Public Key Infrastructure (PKI) system
Enabling firewall rules for incoming and outgoing traffic
Using a Public Key Infrastructure (PKI) system is the most effective method to ensure the authenticity, confidentiality, and integrity of secure communications across a network. PKI employs a pair of public and private keys to encrypt and decrypt data, along with digital certificates issued and verified by a Certificate Authority (CA), thus maintaining secure transmissions. While other options like access control lists and firewalls are critical to comprehensive network security, they do not directly address the specific needs of data encryption and key management intrinsic to PKI.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Public Key Infrastructure (PKI)?
Open an interactive chat with Bash
What role do Certificate Authorities (CAs) play in PKI?
Open an interactive chat with Bash
How does PKI ensure confidentiality and integrity in communications?