Register
96:57
Stop
PMI-RMP - Risk Management Tools and Techniques
Intermediate
1/97
In managing quantum computing threats to cryptographic systems, which approach represents the most effective risk mitigation strategy?
a.
Establishing post-quantum cryptography standards through comprehensive threat modeling
b.
Deploying multi-layered encryption systems with advanced quantum entanglement features
c.
Implementing blockchain-based cryptographic solutions with enhanced key distribution protocols
d.
Implementing quantum-resistant algorithms while maintaining crypto-agility
Intermediate