Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mi
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of
mis-configurations or faults?
Which of the following achieves this goal?
A company needs to receive data that contains personally identifiable information. The company requires
both the transmission and data at rest to be encrypted. Which of the following achieves this goal? (Select
TWO).
Which of the following does full disk encryption prevent?
Which of the following does full disk encryption prevent?
which of the following threats?
Full disk encryption is MOST effective against which of the following threats?
Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate la
Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate
laptops where the file structures are unknown?
which of the following?
To protect corporate data on removable media, a security policy should mandate that all removable
devices use which of the following?
Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a high
performance environment. Which of the following BEST protects the credit card data?
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specifi
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a
specific table?
Which of the following explains the reason for the increase in disk space usage?
A database administrator would like to start encrypting database exports stored on the SAN, but the
storage administrator warns that this may drastically increase the amount of disk space used by the
exports. Which of the following explains the reason for the increase in disk space usage?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive which
already deploys full disk encryption?