Podcast
Questions and Answers
Which of the following actions can authorized users perform with data in use?
Which of the following actions can authorized users perform with data in use?
- Print files (correct)
- Encrypt files
- Access files remotely
- Delete files
What is the main challenge in protecting data in use?
What is the main challenge in protecting data in use?
- Inability to detect data breaches
- Lack of security measures
- Unauthorized access
- Limited encryption options (correct)
What can authorized users do with data in use that may compromise security measures?
What can authorized users do with data in use that may compromise security measures?
- Encrypt files
- Restrict access to files
- Delete files
- Move files to other machines (correct)