ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 30 - ECSS discussion

Report
Export

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

A.

Data in transit

Answers
A.

Data in transit

B.

Data in rest

Answers
B.

Data in rest

C.

Data in use

Answers
C.

Data in use

D.

Data inactive

Answers
D.

Data inactive

Suggested answer: C

Explanation:

Mark implemented full memory encryption for the data stored in RAM. This means that the data is encrypted while it is actively being used by the system (e.g., during processing, execution, or manipulation). Data in use refers to the state when data resides in memory and is accessible by running processes. By encrypting data in use, Mark ensures that even if an attacker gains access to the system's memory, they won't be able to read sensitive information directly.

EC-Council Certified Encryption Specialist (E|CES) documents and study guide1.

EC-Council Certified Encryption Specialist (E|CES) course materials2.

asked 24/10/2024
Alberto Castillo
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first