What is data protection in transit vs data protection at rest?



What is data protection in transit vs data protection at rest?..

Answer / chaitanya

When data is protected while it is just sitting there in its database or on its hard drive- it can be considered at rest. On the other hand, while it is going from server to client it is in-transit. Many servers do one or the other- protected SQL databases, VPN connections, etc, however there are not many that do both primarily because of the extra drain on resources. It is still a good practice to do both however, even if it does take a bit longer.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


What is database in a computer?

0 Answers  


What is residual risk?

1 Answers  


What are the most common computer applications?

0 Answers  


Does indexing slow down computer?

0 Answers  






I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

0 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


What is a spooler on a computer?

0 Answers  


 What is the Chain of Custody?

1 Answers  


 What’s the difference between a White Box test and a Black Box test?

2 Answers  


How would you login to Active Directory from a Linux or Mac box?

0 Answers  


 What is Exfiltration?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)