What provides the best protection against data compromise in the event of physical theft of the device?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What provides the best protection against data compromise in the event of physical theft of the device?

Explanation:
Disk encryption protects data at rest, so even if a device is stolen, the data remains unreadable without the decryption key. By encrypting the entire disk and requiring authentication or a trusted hardware key to unlock it, the attacker can’t access files, emails, or other sensitive information simply by powering on the device. The other options focus on defending data in transit or on the network: a firewall blocks unwanted network access, an Intrusion Prevention System detects or stops malicious traffic, and a VPN protects data while it’s moving over networks. Those don’t prevent exposure if the physical device itself is stolen. Disk encryption is the strongest safeguard for this scenario.

Disk encryption protects data at rest, so even if a device is stolen, the data remains unreadable without the decryption key. By encrypting the entire disk and requiring authentication or a trusted hardware key to unlock it, the attacker can’t access files, emails, or other sensitive information simply by powering on the device. The other options focus on defending data in transit or on the network: a firewall blocks unwanted network access, an Intrusion Prevention System detects or stops malicious traffic, and a VPN protects data while it’s moving over networks. Those don’t prevent exposure if the physical device itself is stolen. Disk encryption is the strongest safeguard for this scenario.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy