A security audit has uncovered that some of the encryption keys used to secure the company B2B
financial transactions with its partners may be too weak. The security administrator needs to
implement a process to ensure that financial transactions will not be compromised if a weak
encryption key is found. Which of the following should the security administrator implement?
A.
Entropy should be enabled on all SSLv2 transactions.
B.
AES256-CBC should be implemented for all encrypted data.
C.
PFS should be implemented on all VPN tunnels.
D.
PFS should be implemented on all SSH connections.