exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 142 discussion

Actual exam question from Cisco's 350-901
Question #: 142
Topic #: 1
[All 350-901 Questions]

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

  • A. cryptographic key exchange
  • B. endpoint security
  • C. cryptographic key generation
  • D. security of data in transit
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 5 months ago
"B" is the correct answer endpoint security
upvoted 7 times
...
designated
Most Recent 8 months, 2 weeks ago
Selected Answer: B
B is correct "Endpoint security - E2EE only encrypts data between the endpoints. This fact means the endpoints themselves are vulnerable to attack. Therefore, enterprises implement endpoint security to protect data beyond in-transit. " https://www.ibm.com/topics/end-to-end-encryption
upvoted 4 times
...
cubic
1 year ago
Selected Answer: B
B, endpoint security!
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago