An organization must transmit highly confidential performance reports to a remote analyst. Which technique is most effective in ensuring that this data, if intercepted, cannot be read by unauthorized entities?
Utilizing obfuscation methods when preparing the report
Using certificate-based network authentication
Applying full-disk encryption on the sender's and recipient's computers
Implementing end-to-end encryption for the transmission
Full-disk encryption is a strong security measure but is relevant to data at rest instead of data in motion. Similarly, obfuscation can make data less obvious but does not protect against a dedicated adversary with the tools to decode the obfuscated data. Certificate-based network authentication adds a layer of security to network access but does not protect the content of data transmissions. End-to-end encryption is specifically designed to protect the confidentiality of data as it travels across a network by ensuring that only the intended recipient, with the correct decryption key, can read the contents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is end-to-end encryption and how does it work?
Open an interactive chat with Bash
What types of encryption algorithms are commonly used in end-to-end encryption?
Open an interactive chat with Bash
What are the potential vulnerabilities to end-to-end encryption?