How would you permanently remove the threat of data falling into the wrong hands?
Answer / eryn kaeberle
There is only one way to 100% ensure this, destroy any and all devices the data is stored on. There are industrial shredders designed for turning hard drives into confetti.
|Is This Answer Correct ?||2 Yes||0 No|
You see a user logging in as root to perform basic functions. Is this a problem?
How many security protocols available?
What is data protection in transit vs data protection at rest?
What is a driver in computer?
On a Windows network, why is it easier to break into a local account than an AD account?
What is the difference between a Black Hat and a White Hat?
I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?
How would you judge if a remote server is running IIS or Apache?
What is your opinion on hacktivist groups such as Anonymous?
You need to reset a password-protected BIOS configuration. What do you do?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
What’s the difference between a White Box test and a Black Box test?