An organization keeps high-value records on a storage array. The design calls for confidentiality measures to remain in place if drives are taken from the premises. Which approach is best for achieving this requirement?
Limit attempts to enter the data center holding all hardware
Deploy full disk encryption along with well-managed secret keys
Use a hashing function before placing records on storage
Full disk encryption ensures that the data on each drive is scrambled so that it remains unreadable if someone takes a physical device. Strong key management is critical to preserve confidentiality. Hashing does not prevent data viewing, it enforces integrity. Simply restricting access does not address risks where drives could be removed by an insider or through theft. VLAN segmentation manages how traffic flows but does not guarantee secrecy where physical hardware is lost.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is full disk encryption and how does it work?
Open an interactive chat with Bash
Why is strong key management important for full disk encryption?
Open an interactive chat with Bash
How does hashing differ from encryption in terms of data security?