Secure data in its various states by applying the appropriate group of security tools or techniques to each data state.
A. Use IPSec VPN, apply encryption, and do data integrity checks. B. Apply encryption and configure strict access control by role. C. Physically lock up storage devices, apply encryption, and employ strict password protection.
1. data at rest 2. data in use 3. data in transit
A-3, B-1, C-2
A-1, B-3, C-2
A-2, B-1, C-3
A-3, B-2, C-1
Create a totally FREE account to save your progress and scores.
Pass Guarantee
Welcome back
Let's continue studying where you left off.