Establishing a method to erase or clear memory is an example of securing which of the following?
A. Data in transit
B. Data at rest
C. Data in use
D. Data in motion
Answer: B. Data at rest
Computer Science & Information Technology
You might also like to view...
The procurement specialist must ensure that general policies and procedures for secure procurement are defined, documented, and included in the overall ____.
A. employee handbook B. procedure manual C. production manual D. policy handbook
Computer Science & Information Technology
An argument that is passed ____ will send only the value of the passed argument.
A. ByRef B. ByHand C. ByVal D. ByVar
Computer Science & Information Technology
A storage medium is inserted into its corresponding ____ in order to be read from or written to.
A. storage processor B. bay C. board D. storage device
Computer Science & Information Technology
A Java character is stored in __________.
a. one byte b. two bytes c. three bytes d. four bytes
Computer Science & Information Technology