Register
5:00
Stop
CEH - Cryptography - Cryptography Concepts
Advanced
1/5
You are conducting a security assessment for a company that needs to implement a secure authentication system for remote users. The system will be used by employees to access sensitive corporate resources from various locations. The client wants to ensure that authentication credentials are securely exchanged while minimizing the risk of man-in-the-middle attacks. Which encryption approach would be most appropriate for this scenario?
a.
Set up a WPA2-Enterprise system that uses TKIP encryption for all remote authentication sessions across the VPN tunnel
b.
Implement 256-bit symmetric encryption (AES) with static pre-shared keys distributed to all employees during onboarding
c.
Use asymmetric encryption (RSA) for key exchange followed by symmetric encryption (AES) for session data
d.
Deploy a pure asymmetric encryption system using 4096-bit RSA for all communications to maximize security of every data packet
Advanced