An organization must store confidential items on-site to satisfy mandatory compliance rules. Which measure is best to ensure these remain safe from unauthorized attempts?
A shared network folder that is protected by a single passcode
A portable software-based vault stored on general-purpose systems
Individual containers residing on employee devices for quick local access
Dedicated hardware that prevents direct manipulation by unauthorized users
Dedicated hardware that resists direct manipulation provides a specialized environment for protecting sensitive data. Software-based storage can be more accessible to adversaries when infrastructure is compromised, while spreading sensitive data across devices without a central protective layer may lead to a breach at individual endpoints. Storing them in a location that has a single passcode is also too easily bypassed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is dedicated hardware better than software-based storage for securing confidential items?
Open an interactive chat with Bash
What are examples of dedicated hardware that can protect sensitive data?
Open an interactive chat with Bash
How does spreading sensitive data across devices increase the risk of a breach?