List of questions
Related questions
Question 29 - 112-51 discussion
Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.
In which of the following states has Steve encrypted the data in the above scenario?
A.
Data in use
B.
Data in transit
C.
Data inactive
D.
Data in rest
Your answer:
0 comments
Sorted by
Leave a comment first