exam questions

Exam SK0-005 All Questions

View all questions & answers for the SK0-005 exam

Exam SK0-005 topic 1 question 131 discussion

Actual exam question from CompTIA's SK0-005
Question #: 131
Topic #: 1
[All SK0-005 Questions]

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

  • A. End-to-end encryption
  • B. Encryption in transit
  • C. Encryption at rest
  • D. Public key encryption
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
surfuganda
8 months ago
Selected Answer: C
C. Encryption at rest Encryption at rest is specifically designed to protect data stored on devices such as hard drives, USB drives, or mobile devices. When data is encrypted at rest, it remains encrypted even if the device is stolen or compromised. This ensures that the data cannot be accessed without the appropriate decryption keys, thereby safeguarding it from unauthorized access.
upvoted 2 times
...
Frank9020
10 months ago
Selected Answer: C
C. Encryption at rest Encryption at rest is a method used to encrypt data stored on a device or media, such as hard drives, ensuring that even if the device is stolen, the data remains secure. This encryption protects the data when it is not actively being used, making it a suitable choice for scenarios where the primary concern is securing data on storage devices.
upvoted 1 times
...
RBL23168
11 months, 2 weeks ago
C. Encryption at rest Encryption at rest is specifically designed to protect data stored on devices such as laptops, mobile devices, and servers. If a device is stolen, encryption at rest ensures that the data remains encrypted and inaccessible to unauthorized individuals. This type of encryption is applied to the storage media itself, making it difficult for someone to retrieve sensitive information even if they have physical possession of the device.
upvoted 1 times
...
RBL23168
11 months, 2 weeks ago
C. Encryption at rest Encrypt it while you still have control. Once it's stolen, it's unusable.
upvoted 1 times
...
Sjabs
1 year ago
Selected Answer: B
answer is B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago