Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

Question:

Which one of the following statements describes the risk of not destroying a session key that is no longer used for completed communication of encrypted data?

Options:

The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.

Systems can only store a certain number of keys and could be unable to generate new keys for communication.

It increases the risk of duplicate keys existing for the key space of the algorithm.

The risk of weaker keys being generated increases as the number of keys stored increases.

Correct Answer

The Correct Answer for this Question is

The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.

Leave a Comment