An IS auditor is reviewing an organization's method to transport sensitive data between offices. Which of the following would cause the auditor MOST concern?
A. The method relies exclusively on the use of digital signatures.
B. The method relies exclusively on the use of asymmetric encryption algorithms.
C. The method relies exclusively on the use of public key infrastructure.
D. The method relies exclusively on the use of symmetric encryption algorithms.
A. The method relies exclusively on the use of digital signatures.
B. The method relies exclusively on the use of asymmetric encryption algorithms.
C. The method relies exclusively on the use of public key infrastructure.
D. The method relies exclusively on the use of symmetric encryption algorithms.