After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe's desktop remain encrypted when moved to external media or other network based storage?
A. Whole disk encryption
B. Removable disk encryption
C. Database record level encryption
D. File level encryption
Answer: D. File level encryption
You might also like to view...
Which of the following statements are true?
A. Encapsulating data fields makes the program easy to maintain. B. If you don't use the public keyword, the visibility is private by default. C. Encapsulating data fields helps prevent programming errors. D. Encapsulating data fields makes the program short. E. Use the private keyword to encapsulate data fields
If you want to remove the AutoCorrect Options button from the screen, you can press the ____ key.
A. ESCAPE B. OPTION C. COMMAND D. SHIFT
Documentation that describes the function of the rung is a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
A VMware vSphere 6.x Administrator is tasked with configuring vRealize Log Insight. What three ports can be used for syslog? (Choose three.)
A. 514/UDP B. 1514/TCP C. 8443/TCP D. 514/TCP E. 123/UDP