PrepAway - Latest Free Exam Questions & Answers

Which of thefollowing should the consultant recommend t…

Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of thefollowing should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?

PrepAway - Latest Free Exam Questions & Answers

A.
Wiping of remnant data

B.
Hashing and encryption of data in-use

C.
Encryption of data in-transit

D.
Hashing of data at-rest


Leave a Reply