1
answer
1
watching
218
views
aminul2005Lv1
10 Feb 2022
Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted:
Options:
A when it is passed across a local network.
B in memory during processing
C when it is written to a system's solid-state drive.
D by an enterprise hardware security module.
Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted:
Options:
A when it is passed across a local network.
B in memory during processing
C when it is written to a system's solid-state drive.
D by an enterprise hardware security module.
Liked by aminul2005 and 3 others
10 Feb 2022