A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable. Which of the following solutions BEST meets all of the architect's objectives?
A) An internal key infrastructure that allows users to digitally sign transaction logs
B) An agreement with an entropy-as-a-service provider to increase the amount of randomness in generated keys.
C) A publicly verified hashing algorithm that allows revalidation of message integrity at a future date.
D) An open distributed transaction ledger that requires proof of work to append entries.
Correct Answer:
Verified
Q69: A penetration tester noticed special characters in
Q70: A security architect is determining the best
Q71: As a result of an acquisition, a
Q72: A systems administrator has installed a disk
Q73: A government organization operates and maintains several
Q75: A medical device company is implementing a
Q76: Which of the following is an external
Q77: Click on the exhibit buttons to view
Q78: The marketing department has developed a new
Q79: A security analyst is attempting to break
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents