Which data protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

Which data protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

Which data protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?

A.
Boot protection

B.
User authentication

C.
Full disk encryption

D.
File encryption

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *