ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 29 - 112-51 discussion

Report
Export

Mark, a network administrator in an organization, was assigned the task of preventing data from falling into the wrong hands. In this process, Mark implemented authentication techniques and performed full memory encryption for the data stored on RAM.

In which of the following states has Steve encrypted the data in the above scenario?

A.
Data in use
Answers
A.
Data in use
B.
Data in transit
Answers
B.
Data in transit
C.
Data inactive
Answers
C.
Data inactive
D.
Data in rest
Answers
D.
Data in rest
Suggested answer: A

Explanation:

The state in which Mark encrypted the data in the above scenario is data in use. Data in use refers to data that is being processed or manipulated by an application or a system, such as data stored on RAM or CPU registers. Data in use is the most vulnerable state of data, as it is exposed to various threats, such as memory scraping, buffer overflow, or side-channel attacks, that can compromise the confidentiality, integrity, or availability of the data. Data in use encryption is a technique that protects the data while it is being processed by encrypting it in memory using hardware or software solutions. Data in use encryption prevents unauthorized access or modification of the data, even if the system is compromised or the memory is dumped. Data in use encryption is one of the three types of data encryption, along with data at rest encryption and data in transit encryption123.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-23 to 3-24

Encryption: Data at Rest, Data in Motion and Data in Use, Jatheon, 2020

Data in Use Encryption: What It Is and Why You Need It, Fortanix, 2020

asked 18/09/2024
juan otero
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first