List of questions
Related questions
Question 30 - ECSS discussion
Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.
In which of the following states has Steve encrypted the data in the above scenario?
A.
Data in transit
B.
Data in rest
C.
Data in use
D.
Data inactive
Your answer:
0 comments
Sorted by
Leave a comment first