The CISO has declared that full disk encryption will be implemented on all devices. Against which of the following threats is the company now protected?
A. man-in-the-middle attacks
B. data removed from stolen or lost devices
C. malware
D. DDoS attacks
B
Explanation: Full disk encryption will prevent data being removed from stolen or lost devices by not only encrypting the data drives, but can also be implemented to lock the operating system drive, preventing the system from booting unless a key is presented.
You might also like to view...
What is the output of the following code?
``` public class Test { public static void main(String[] args) { int[][] matrix = {{1, 2, 3, 4}, {4, 5, 6, 7}, {8, 9, 10, 11}, {12, 13, 14, 15}}; for (int i = 0; i < 4; i++) System.out.print(matrix[i][1] + " "); } } ``` a. 1 2 3 4 b. 4 5 6 7 c. 1 3 8 12 d. 2 5 9 13 e. 3 6 10 14
In the image shown above, the arrow is pointing at the region known as a(n) ________
Fill in the blank(s) with correct word
A chart is:
A) a group of related data points in an Excel window. B) a visual depiction of numerical data. C) text that describes a group of data points. D) a set of numeric values shown on a worksheet.
MSN Bill Pay is an example of an e-business that offers ____.
A. bill payment services B. freeware C. shareware D. peer-to-peer file-sharing