Which of the following techniques can be used to protect the data in a portable storage device?

In an organization, employees are restricted from using their own storage devices, and only the company’s portable storage devices are allowed. As employees are carrying the company’s portable device outside their premises, the data should be protected from unauthorized access.

Which of the following techniques can be used to protect the data in a portable storage device?
A . Data retention
B . Data encryption
C . Data resilience
D . Disk mirroring

Answer: B

Latest 112-51 Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments