(ISC)2(ISC)2
CISSP · Question #904
CISSP Question #904: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP to reveal the answer and full explanation for question #904. The question stem and answer options stay visible for context.
Submitted by chen.hong· Mar 5, 2026Security Architecture and Engineering
Question
An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?
Options
- ADiffle-Hellman (DH) algorithm
- BElliptic Curve Cryptography (ECC) algorithm
- CDigital Signature algorithm (DSA)
- DRivest-Shamir-Adleman (RSA) algorithm
Unlock CISSP to see the answer
You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Key exchange#Diffie-Hellman#Cryptography#Hard-coded keys