Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device’s drive if the device is lost?
FDE (Full Disk Encryption) should be used to ensure an attacker is unable to read the contents of a mobile device’s drive if the device is lost.
Full Disk Encryption secures all the data on a mobile device by encrypting the entire drive, making it inaccessible to unauthorized users in the event of loss or theft. This method ensures that even if someone gains physical access to the device, they cannot access the stored data without the proper authentication.
Trusted Platform Module (TPM) is a hardware component that provides secure cryptographic functions and can store encryption keys. However, while it enhances security by protecting keys used in encryption processes, it does not itself encrypt data on the device. Therefore, TPM alone does not prevent an attacker from reading data if the device is lost.
Elliptic Curve Cryptography (ECC) is a form of public key encryption that provides secure communication. Although it is effective for secure key exchanges and digital signatures, it does not encrypt the entire storage drive of a mobile device. Thus, ECC is not a solution for protecting lost device data from unauthorized access.
Full Disk Encryption (FDE) encrypts all data on a storage device, ensuring that without the correct credentials, the data remains unreadable. This comprehensive approach directly addresses the concern of unauthorized access if the device is lost, making it the most effective choice for this scenario.
Hardware Security Module (HSM) is a physical device used to manage and protect cryptographic keys. While it provides a secure environment for key management, it does not encrypt the data stored on a mobile device itself. Therefore, HSM is not applicable for preventing data access in the event of device loss.
To protect sensitive data on a mobile device in the event of loss, Full Disk Encryption (FDE) is essential, as it encrypts the entire drive, ensuring that unauthorized users cannot access any data. While other options like TPM, ECC, and HSM provide various security functions, they do not directly prevent data exposure from a lost device, highlighting FDE as the most effective solution.
Related Questions
View allWhich of the following mitigation techniques would a security analyst...
A security manager wants to reduce the number of steps required to ide...
A Chief Information Security Officer (CISO) determines that a major se...
Which of the following threat vectors is most commonly utilized by ins...
An organization wants to deploy software in a container environment to...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations