PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following should the security administrator implement?

A security audit has uncovered that some of the encryption keys used to secure the company B2B
financial transactions with its partners may be too weak. The security administrator needs to
implement a process to ensure that financial transactions will not be compromised if a weak
encryption key is found. Which of the following should the security administrator implement?