nerdexam
(ISC)2(ISC)2

CISSP · Question #1464

CISSP Question #1464: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP to reveal the answer and full explanation for question #1464. The question stem and answer options stay visible for context.

Submitted by obi.ng· Mar 5, 2026Security Architecture and Engineering

Question

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?

Options

  • AUse a Secure Hash Algorithm 256 (SHA-256).
  • BUse a hierarchy of encryption keys.
  • CUse Hash Message Authentication Code (HMAC) keys.
  • DUse Rivest-Shamir-Adleman (RSA) keys.

Unlock CISSP to see the answer

You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Symmetric encryption#Key management#Key hierarchy#Cryptography
Full CISSP PracticeBrowse All CISSP Questions