Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

A.
File encryption

B.
Full disk encryption

C.
User authentication

D.
Boot protection

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *