A way to assure data at-rest is secure even in the event of loss or theft is to use:

A. Full device encryption.
B. Special permissions on the file system.
C. Trusted Platform Module integration.
D. Access Control Lists.


Ans: A. Full device encryption.

Computer Science & Information Technology

You might also like to view...

The list container provided by the Standard Template Library is a template version of a

a. singly linked list b. doubly linked list c. circular linked list d. backward linked list e. None of these

Computer Science & Information Technology

The Alto computer, built by ________, was the first to use a graphical user interface (GUI)

A) IBM B) Microsoft C) Xerox D) Apple

Computer Science & Information Technology

Which of the following would be TRUE of the Bcc: box in an e-mail header?

A) Bcc is an option available only with standalone packages such as Outlook. B) Bcc is an option available only with Web-based e-mail. C) The primary recipient will not see the address of anyone copied using this line. D) Bcc is available in all e-mail packages today.

Computer Science & Information Technology

A delimiter is a data separator.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology