Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is data protection in transit vs data protection at rest?



What is data protection in transit vs data protection at rest?..

Answer / chaitanya

When data is protected while it is just sitting there in its database or on its hard drive- it can be considered at rest. On the other hand, while it is going from server to client it is in-transit. Many servers do one or the other- protected SQL databases, VPN connections, etc, however there are not many that do both primarily because of the extra drain on resources. It is still a good practice to do both however, even if it does take a bit longer.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

What is data source in computer?

0 Answers  


 What’s the difference between a White Box test and a Black Box test?

2 Answers  


 What is the Chain of Custody?

1 Answers  


Why would you bring in an outside contractor to perform a penetration test?

1 Answers  


What is worse in Firewall Detection, a false negative or a false positive? And why?

1 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


What is the most commonly used computer application?

0 Answers  


What is residual risk?

1 Answers  


On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


What are the three ways to authenticate a person?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)