A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet the needs?

Posted by: Pdfprep Category: CAS-002 Tags: , ,

A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet the needs?
A . A partition-based software encryption product with a low-level boot protection and authentication
B . A container-based encryption product that allows the end users to select which files to encrypt
C . A full-disk hardware-based encryption product with a low-level boot protection and authentication
D . A file-based encryption product using profiles to target areas on the file system to encrypt

Answer: D

Leave a Reply

Your email address will not be published.