Sam and Tim secure their systems using endpoint security products. The temporary files created in Sam’s system are not encrypted whereas they are encrypted in Tim’s case. Which of the below encryption techniques were used by Tim and Sam respectively?
Disk Encryption and File Encryption
File Encryption and Disk Encryption
Disk Encryption and End Encryption
End Encryption and File Encryption
To get all Infosys Certified Cyber Security Manager - Foundation Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee