CHAPTER 18Workstation Security Configuration: Core 2 Objective 2.6: Given a scenario, configure a workstation to meet best practices for security.

DATA-AT-REST ENCRYPTION

Workstation security starts with protecting the data residing on it. Data that is not being transmitted through a network or being used by an application is referred ...

Get CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.