Which of thefollowing should the consultant recommend t…

Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of thefollowing should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?

Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of thefollowing should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?

A.
Wiping of remnant data

B.
Hashing and encryption of data in-use

C.
Encryption of data in-transit

D.
Hashing of data at-rest



Leave a Reply 0

Your email address will not be published. Required fields are marked *