A medical research team keeps archived datasets on a private server. They want a method that protects the information against unauthorized reading when someone gains physical or logical access to the stored data. Which approach best meets this goal?
Enable a process that keys and encrypts the offline files
Use a secure transport protocol for data transfers
Add role-based permissions and rely on access logs
Expand the network monitoring system to include intrusion alerts
Applying an encryption method to stored data ensures the information remains unreadable even if unauthorized parties access the underlying storage. Other approaches, such as assigning permissions or focusing on detecting intrusions, do not guarantee that data is unreadable in the event of a breach. Encrypting inactive files is fundamental for safeguarding proprietary or sensitive content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data encryption, and how does it protect stored information?
Open an interactive chat with Bash
What is the difference between encryption for data at rest and data in transit?
Open an interactive chat with Bash
What role do encryption keys play, and how are they managed securely?