Which of the following should the security administrator implement in the following scenario? A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak? The security administrator needs to\r\nimplement a process to ensure that financial transactions will not be compromised if a weak encryption key is found.
A. Entropy should be enabled on all SSLv2 transactions. B. AES256-CBC should be implemented for all encrypted data. C. PFS should be implemented on all VPN tunnels. D. PFS should be implemented on all SSH connections.