Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 190 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 190
Topic #: 1
[All 312-50v12 Questions]

You are the chief cybersecurity officer at CloudSecure Inc., and your team is responsible for securing a cloud based application that handles sensitive customer data. To ensure that the data is protected from breaches, you have decided to implement encryption for both data-at-rest and data-in-transit. The development team suggests using SSL/TLS for securing data in transit. However, you want to also implement a mechanism to detect if the data was tampered with during transmission. Which of the following should you propose?

  • A. Implement IPsec in addition to SSL/TLS.
  • B. Switch to using SSH for data transmission.
  • C. Encrypt data using the AES algorithm before transmission.
  • D. Use the cloud service provider's built-in encryption services.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
LoveBug4
5 months ago
Selected Answer: A
IPsec provides data encryption and data integrity. Module 11, page 1592
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: A
The only option that is valid, is A. C is indeed a strong encryption algorithm but standalone doesn't have the capabilities of detecting data tempering
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: D
Is C. key word " implement encryption for both data-at-rest and data-in-transit"
upvoted 1 times
...
DruSuperman
8 months, 3 weeks ago
Selected Answer: A
I think this addresses it. From Module 3 PG 391 To maximize network security, use strong encryption for all traffic placed on transmission media without considering its type and location. This is the best method to prevent IP spoofing attacks. IPSec can be used to drastically reduce the IP spoofing risk, as it provides data authentication, integrity, and confidentiality.
upvoted 1 times
...
anarchyeagle
8 months, 4 weeks ago
Selected Answer: A
Chat GPT: Implement IPsec in addition to SSL/TLS: IPsec (Internet Protocol Security) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to be used during the session. IPsec can be used in conjunction with SSL/TLS to provide an additional layer of security that includes integrity checks, ensuring that data has not been tampered with during transmission. This approach adds another layer of security that operates at a different layer of the network stack, providing comprehensive protection for data in transit.
upvoted 3 times
John07
7 months, 3 weeks ago
How did you "implement encryption for both data-at-rest and data-in-transit" using IPSec and SSL/TLS ?
upvoted 1 times
evilrabbit
7 months, 1 week ago
The key phrase here is "a mechanism to detect if the data was tampered with during transmission", so the correct answer is A
upvoted 1 times
...
...
...
JR22craft
9 months ago
Selected Answer: C
C. Encrypt data using the AES algorithm before transmission. IPSec is redundant
upvoted 1 times
...
misolchang
9 months ago
Selected Answer: C
ChatGPT said: Given these options, the most suitable choice for ensuring both confidentiality and integrity during data transmission is: C. Encrypt data using the AES algorithm before transmission. To ensure data integrity, you can also incorporate a message authentication code (MAC) or a digital signature along with AES encryption. This way, you'll have both encryption for confidentiality and a mechanism for detecting tampering during transmission.
upvoted 2 times
...
brrbrr
9 months ago
Selected Answer: C
C. To address data integrity, it is common to use encryption in combination with message authentication codes (MAC) or hash functions. In this case, encrypting the data using the AES algorithm before transmission and incorporating a mechanism for verifying the integrity of the data (such as using a HMAC - Hash-based Message Authentication Code) would help detect if the data was tampered with during transmission. Options A, B, and D do not specifically address the need for integrity checking during transmission: A. Implement IPsec in addition to SSL/TLS: IPsec is used for network layer security and could be redundant when SSL/TLS is already in place. B. Switch to using SSH for data transmission: While SSH provides encryption and integrity checking, it may not be the best choice for application-level data transmission, especially in a cloud environment. D. Use the cloud service provider's built-in encryption services: it may not be sufficient for ensuring integrity during data transmission unless combined with an appropriate integrity verification mechanism.
upvoted 3 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: A
A. Implement IPsec in addition to SSL/TLS.
upvoted 3 times
LeongCC
9 months ago
Agree!
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...