Questions: You are the cybersecurity manager at a company that regularly handles sensitive customer data. To enhance the security of data transmissions between server and client systems, you have decided to implement a system to support data integrity, confidentiality, authentication, management of encryption keys, and digital signatures. Which system is best suited to this goal? A. Virtual Private Network (VPN) B. Firewall C. Intrusion Detection System (IDS) D. Public Key Infrastructure (PKI)

You are the cybersecurity manager at a company that regularly handles sensitive customer data. To enhance the security of data transmissions between server and client systems, you have decided to implement a system to support data integrity, confidentiality, authentication, management of encryption keys, and digital signatures. Which system is best suited to this goal?
A. Virtual Private Network (VPN)
B. Firewall
C. Intrusion Detection System (IDS)
D. Public Key Infrastructure (PKI)
Transcript text: Domain 1.0 General Security Concepts Assessment This Question: 00:08 Total: 02:15 Pause Assessment 18.2\% Complete You are the cybersecurity manager at a company that regularly handles sensitive customer data. To enhance the security of data transmissions between server and client systems, you have decided to implement a system to support data integrity, confidentiality, authentication, management of encryption keys, and digital signatures. Which system is best suited to this goal? A. Virtual Private Network (VPN) B. Firewall C. Intrusion Detection System (IDS) D. Public Key Infrastructure (PKI) $\square$ A $\square$ $\square$ $\square$ Confirm Difficulty Level: Difficult Report Content Errors Support
failed

Solution

failed
failed

The answer is D: Public Key Infrastructure (PKI).

Explanation for each option:

A. Virtual Private Network (VPN): While a VPN can provide confidentiality by encrypting data in transit and can help with authentication, it does not inherently provide data integrity, management of encryption keys, or digital signatures. Therefore, it is not the best choice for all the specified requirements.

B. Firewall: A firewall is primarily used to control incoming and outgoing network traffic based on predetermined security rules. It does not provide data integrity, confidentiality, authentication, management of encryption keys, or digital signatures. Thus, it is not suitable for the goal described.

C. Intrusion Detection System (IDS): An IDS is designed to detect unauthorized access or anomalies in network traffic. It does not provide data integrity, confidentiality, authentication, management of encryption keys, or digital signatures. Therefore, it is not the best choice for the specified requirements.

D. Public Key Infrastructure (PKI): PKI is a comprehensive system that supports data integrity, confidentiality, authentication, management of encryption keys, and digital signatures. It uses a combination of public and private keys to encrypt and decrypt data, ensuring secure communication and data integrity. It also supports digital signatures, which verify the authenticity of the data and the sender. Therefore, PKI is the best-suited system for the goal described.

In summary, PKI is the most appropriate choice for enhancing the security of data transmissions by supporting all the specified requirements.

Was this solution helpful?
failed
Unhelpful
failed
Helpful