Your organization implements hard drive encryption on a file server. Which security tenet will this cover?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
A
Explanation: Implementing hard drive encryption on a file server will cover the confidentiality tenet.
You might also like to view...
What is a delayed acknowledgement?
What will be an ideal response?
________ indexes place marked entries and subentries on separate lines with spacing before each indexed item
A) Indented B) Run-in C) Cross-referenced D) Table
Jimmy is running out of desk space. He keeps three computers on his desk. The three computers can’t be moved, and they need to be running at the same time. Currently Jimmy has three mice, keyboards, and monitors running on his desk. What can Jimmy do to free up space on his desk?
A. Use a KVM switch. B. Purchase a touch screen monitor. C. Purchase a touchpad mouse. D. Use dual monitors.
What is the structure of the default host name suggested by YaST?
A. yast-xxxx B. host-xxxx C. linux-xxxx D. server-xxxx