David is setting up a new computer for his company's CEO. He wants to ensure that even if the laptop is lost or stolen, the data on it cannot be accessed without proper authentication. Which of the following would be the most effective solution?
- Antivirus Software
- Biometric Authentication
- Firewall
- Full Disk Encryption
The most effective solution for ensuring that data on a lost or stolen laptop cannot be accessed without proper authentication is Full Disk Encryption. Full Disk Encryption encrypts the entire contents of the hard drive, making the data inaccessible without the correct decryption key or password.
Loading...
Related Quiz
- A backup technique that captures every version of a file or database record every time it changes is referred to as _______ backup.
- What is the primary function of an Intrusion Detection System (IDS)?
- Regular _______ sessions are essential to ensure that employees are up-to-date with the latest security policies and practices.
- A company recently suffered a data breach. Upon investigation, it was found that they failed to encrypt customer data, which is a requirement under the regulation they adhere to. This situation could result in what kind of repercussions for the company?
- What common practice involves creating a duplicate copy of data to ensure its availability in case of data loss?