Scenario: During an audit, you discover that a database uses outdated encryption algorithms that are no longer considered secure. What should be the immediate action to enhance the database's security?
- Conduct regular security training for database users
- Continue using the outdated encryption algorithms
- Disable encryption altogether
- Upgrade the encryption algorithm to a more secure one
Upgrade the encryption algorithm to a more secure one
Loading...
Related Quiz
- In role-based access control (RBAC), permissions are assigned to ____________ rather than individual users.
- Which type of testing focuses on verifying the consistency and accuracy of data transformations during ETL processes?
- During test script execution, the results are compared to the _______ to determine pass or fail.
- What is the primary objective of authentication testing?
- What is the primary difference between load testing and stress testing?