CheckPoint Exam Questions

Which data-protection method provides an effective deterrent to illicit network access via networkco

Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

A.
File encryption

B.
Full disk encryption

C.
User authentication

D.
Boot protection

Explanation: