Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit
B. Data at rest
C. Data in use
D. Data in motion

Answer: B. Data at rest

Computer Science & Information Technology

You might also like to view...

Slides that are adjacent to each other in a presentation are called ________ slides

Fill in the blank(s) with correct word

Computer Science & Information Technology

____________________ is a popular format for static graphics and animations.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology