Academy Login

Weekly CISSP Exam Questions

Question:  For maximum security, what should be used for encrypting data at rest?

A.  DES

B.  RSA

C.   SHA-256

D.  AES

Correct Answer:  D

Explanation:  

DES (Data Encryption Standard): This older symmetric-key algorithm is generally considered to be weak by today's standards, mainly because of its small key size, which makes it vulnerable to brute-force attacks. 

RSA: This is an asymmetric encryption algorithm often used for secure data transmission and digital signatures but is generally not used for encrypting large amounts of data at rest due to performance considerations. 

SHA-256: This is a cryptographic hash function, not an encryption algorithm. Hash functions are used for data integrity verification and other functions but do not provide a way to decrypt data. 

AES (Advanced Encryption Standard): This symmetric encryption algorithm is widely regarded as the most secure and efficient for encrypting data at rest. It offers multiple key lengths (128, 192, or 256 bits) and is considered secure against all but the most powerful attacks, given a strong key and proper implementation. 

 

Podcasts

Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.

Listen Podcasts

CISSP Cyber Training Academy

Tired of not knowing how to study for the CISSP Exam? 

Check out the CISSP Cyber Training Academy to help you on your journey!

Learn about the Academy!

CISSP Cyber Training - YouTube

Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.   

Check out channel