Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit
B. Data at rest
C. Data in use
D. Data in motion


Answer: B. Data at rest

Computer Science & Information Technology

You might also like to view...

The procurement specialist must ensure that general policies and procedures for secure procurement are defined, documented, and included in the overall ____.

A. employee handbook B. procedure manual C. production manual D. policy handbook

Computer Science & Information Technology

An argument that is passed ____ will send only the value of the passed argument.

A. ByRef B. ByHand C. ByVal D. ByVar

Computer Science & Information Technology

A storage medium is inserted into its corresponding ____ in order to be read from or written to.

A. storage processor B. bay C. board D. storage device

Computer Science & Information Technology

A Java character is stored in __________.

a. one byte b. two bytes c. three bytes d. four bytes

Computer Science & Information Technology