Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specifi
Which of the following types of data encryption would Matt, a security administrator, use to encrypt
a specific table?
Which of the following explains the reason for the increase in disk space usage?
A database administrator would like to start encrypting database exports stored on the SAN, but
the storage administrator warns that this may drastically increase the amount of disk space used
by the exports. Which of the following explains the reason for the increase in disk space usage?
which already deploys full disk encryption?
ION NO: 93
Which of the following is an advantage of implementing individual file encryption on a hard drive
which already deploys full disk encryption?
Which of the following BEST protects the master password list?
A team of firewall administrators have access to a `master password list’ containing service
account passwords. Which of the following BEST protects the master password list?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company provided
mobile devices. Which of the following would BEST address the administrator’s concerns?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile dev
Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?