Sam and Tim secure their systems using endpoint security products. The temporary files created in Sam’s system are not encrypted whereas they are encrypted in Tim’s case. Which of the below encryption techniques were used by Tim and Sam respectively?

Disk Encryption and File Encryption

File Encryption and Disk Encryption

Disk Encryption and End Encryption

End Encryption and File Encryption

Verified Answer
Correct Option - a

To get all Infosys Certified Cyber Security Manager - Foundation Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in