What is data protection in transit vs data protection at rest?



What is data protection in transit vs data protection at rest?..

Answer / chaitanya

When data is protected while it is just sitting there in its database or on its hard drive- it can be considered at rest. On the other hand, while it is going from server to client it is in-transit. Many servers do one or the other- protected SQL databases, VPN connections, etc, however there are not many that do both primarily because of the extra drain on resources. It is still a good practice to do both however, even if it does take a bit longer.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


What is worse in Firewall Detection, a false negative or a false positive? And why?

1 Answers  


 What is the difference between a Black Hat and a White Hat?

1 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


What is a table in computer?

0 Answers  






What is dora process in DHCP and how it works?

0 Answers  


What is meant by computer application?

0 Answers  


You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 Answers  


Why would you bring in an outside contractor to perform a penetration test?

1 Answers  


What’s better, a red team or a blue team?

1 Answers  


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

0 Answers  


You need to reset a password-protected BIOS configuration. What do you do?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)