Data in transit is incorrect. The official terminology is data in motion.
Data-in-Motion: Data that is in transit over a network. Think data packets working their way across the internet.
Data-at-Rest: Stored data that resides on hard drives, tapes, in the cloud, or on other storage media. When this is taught, it's almost always taught as a USB stick laying on a desk in an office. Don't forget that this is broad category.
Data-in-Processing: Data that is actively in use by a computer system. Includes data stored in memory while processing takes place.
Data at rest refers to any data stored on media and it’s common to
encrypt sensitive data. For example, it’s possible to encrypt individual fields
in a database (such as the fields holding customer credit card data),
individual files, folders, or a full disk.
Full disk encryption (FDE) is a security measure that protects data at rest, meaning data that is stored on a device, such as a laptop's hard drive. When FDE is enabled, all the data on the disk is encrypted, and it remains encrypted even when the device is powered off or not in use.
This ensures that if the laptop is lost, stolen, or accessed by unauthorized individuals, the data on the disk is still protected and cannot be easily accessed or read without the decryption key. FDE helps to safeguard sensitive information from potential data breaches or unauthorized access to the physical device.
Full disk encryption (FDE) is a security measure that encrypts the entire hard drive or storage media of a device, such as a laptop, to protect the data stored on it when the device is powered off or not in use. It ensures that if the laptop is lost, stolen, or accessed by unauthorized individuals, the data on the disk remains encrypted and inaccessible without the appropriate decryption key or password. This protects the data at rest from being compromised in such situations.
Data at Rest is correct Answer.
Data at rest: Data at rest is data in its stored or resting state, which is
typically on some type of persistent storage such as a hard drive or tape.
Symmetric encryption is used in this case.
upvoted 5 times
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Gravoc
Highly Voted 2 years, 9 months agoxxxdolorxxx
Highly Voted 2 years, 4 months agoLordJaraxxus
Most Recent 1 year, 3 months agocyberPunk28
1 year, 6 months agoApplebeesWaiter1122
1 year, 10 months agoProtract8593
1 year, 10 months agoZdane
2 years, 2 months agoDALLASCOWBOYS
2 years, 4 months agokstevens11
2 years, 7 months agoserginljr
2 years, 9 months ago