When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:

Posted by: Pdfprep Category: SY0-501 Tags: , ,

When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:
A . session keys.
B . encryption of data at rest
C . encryption of data in use.
D . ephemeral keys.

Answer: D

Explanation:

Compromising data in use enables access to encrypted data at rest and data in motion. For example, someone with access to random access memory (RAM) can parse that memory to locate the encryption key for data at rest. Once they have obtained that encryption key, they can decrypt encrypted data at rest.

Leave a Reply

Your email address will not be published.