SY0-501 · Question #372
SY0-501 Question #372: Real Exam Question with Answer & Explanation
The correct answer is D: Poor implementation. Despite utilizing strong and modern TLS cipher suite components like AES-GCM-256, SHA-384, and ECDSA, an information loss breach is most likely attributed to flaws in the system's overall security implementation.
Question
A web server, which is configured to use TLS with AES-GCM-256, SHA-384, and ECDSA, recently suffered an information loss breach. Which of the following is MOST likely the cause?
Options
- AInsufficient key bit length
- BWeak cipher suite
- CUnauthenticated encryption method
- DPoor implementation
Explanation
Despite utilizing strong and modern TLS cipher suite components like AES-GCM-256, SHA-384, and ECDSA, an information loss breach is most likely attributed to flaws in the system's overall security implementation.
Common mistakes.
- A. AES-GCM-256 utilizes a 256-bit key, which is considered a very strong key length and not insufficient.
- B. The combination of AES-GCM-256 for encryption, SHA-384 for hashing, and ECDSA for digital signatures constitutes a strong and modern cipher suite, not a weak one.
- C. AES-GCM (Galois/Counter Mode) is an authenticated encryption with associated data (AEAD) mode, meaning it provides both confidentiality and data integrity/authentication, thus it is not an unauthenticated encryption method.
Concept tested. Secure implementation vs. strong cryptographic primitives
Reference. https://learn.microsoft.com/en-us/windows-server/security/tls/tls-advanced-settings-config
Community Discussion
No community discussion yet for this question.