Question: A data security policy has rules applied to data in motion. Which of the following would be subject to it ? Choose all that apply.

A data security policy has rules applied to "data in motion." Which of the following would be subject to it? Choose all that apply.
a.
Files on a USB flash drive
b.
User credentials being sent to a web server
c.
Packets in the outgoing cache of a router
d.
Files being copied from a network drive
e.
Records being edited by a database query

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!