Establishing a method to erase or clear memory is an example of securing which of the following?
A. Data in transit
B. Data at rest
C. Data in use
D. Data in motion
Answer: B. Data at rest
Computer Science & Information Technology
You might also like to view...
Slides that are adjacent to each other in a presentation are called ________ slides
Fill in the blank(s) with correct word
Computer Science & Information Technology
____________________ is a popular format for static graphics and animations.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology