Correct Answer: By encrypting them
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Cyber Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Cyber Security MCQ Questions
Your computer has been infected, and is sending out traffic to a targeted system upon receiving a command from a botmaster. What condition is your computer currently in?
You choose a cybersecurity framework for your financial organization that implements an effective and auditable set of governance and management processes for IT. Which framework are you choosing?
NIST issued a revision to SP 800-37 in December 2018. It provides a disciplined, structured, and flexible process for managing security and privacy risk. Which type of document is SP 800-37?
The most notorious military-grade advanced persistent threat was deployed in 2010, and targeted centrifuges in Iran. What was this APT call?
Where would you record risks that have been identified and their details, such as their ID and name, classification of information, and the risk owner?
Two competing online retailers process credit card transactions for customers in countries on every continent. One organization is based in the United States. The other is based in the Netherlands. With which regulation must both countries comply while ensuring the security of these transactions?
How many keys would be necessary to accomodate 100 users in an asymmetric cryptography system?
You need to disable the camera on corporate devices to prevent screen capture and recording of sensitive documents, meetings, and conversations. Which solution would be be suited to the task?
You organization is conducting a pilot deployment of a new e-commerce application being considered for purchase. You need to recommend a strategy to evaluate the security of the new software. Your organization does not have access to the application's source code. Which strategy should you choose?
Which is not a threat modeling methodology?