Using a protocol analyzer, a security consultant was able to capture employee's credentials. Which of the following should the consultant recommend to the company, in order to mitigate the risk of employees credentials being captured in the same manner in the future?

A. Wiping of remnant data
B. Hashing and encryption of data in-use
C. Encryption of data in-transit
D. Hashing of data at-rest


Answer: B. Hashing and encryption of data in-use

Computer Science & Information Technology

You might also like to view...

Function________waits for anyone of the parent’s child processes to complete before allowing the parent process to continue its execution.

a) os.wait. b) os.block. c) os.sleep. d) None of the above.

Computer Science & Information Technology

How many times the following code prints "Welcome to C++"?

``` int count = 0; do { cout << "Welcome to C++"; count++; } while (count < 10); ``` A. 8 B. 10 C. 11 D. 9 E. 0

Computer Science & Information Technology

Which of the following is NOT a standard way of reducing the file size of a PowerPoint presentation?

A) changing the file format to a JPEG format B) removing portions of images that have been cropped C) reducing the resolution of images D) changing the theme of the presentation

Computer Science & Information Technology

When a packet is sent between two ECN-capable routers, the packet is usually marked ECT(0) or ECT(10) for ECN Capable Transport.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology