Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...


How would you permanently remove the threat of data falling into the wrong hands?



How would you permanently remove the threat of data falling into the wrong hands?..

Answer / eryn kaeberle

There is only one way to 100% ensure this, destroy any and all devices the data is stored on. There are industrial shredders designed for turning hard drives into confetti.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Computer Security Interview Questions

 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


How many security protocols available?

1 Answers  


What is data protection in transit vs data protection at rest?

1 Answers  


What is a driver in computer?

0 Answers  


On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  






 What is the difference between a Black Hat and a White Hat?

1 Answers  


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

0 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


 What is your opinion on hacktivist groups such as Anonymous?

1 Answers  


You need to reset a password-protected BIOS configuration. What do you do?

1 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


 What’s the difference between a White Box test and a Black Box test?

1 Answers  






Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)