Question: A data security policy has rules applied to data in motion. Which of the following would be subject to it ? Choose all that apply.
A data security policy has rules applied to "data in motion." Which of the following would be subject to it Choose all that apply.
a
Files on a USB flash drive
b
User credentials being sent to a web server
c
Packets in the outgoing cache of a router
d
Files being copied from a network drive
e
Records being edited by a database query
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
