>_COMMAND ZERO
CertificationsPricing
LearnCompTIA Security+Security Architecture
medium
Single Answer
0

Nick wants to protect Microsoft Excel files in transit across a network. Which of the following is not a method he could use to protect data in transit?

Answer Options

A

TLS

B

VPN

C

File encryption

D

Disk encryption

Correct Answer: D

Explanation

Disk encryption is used to protect data at rest, not data in use or data in transit. TLS, VPNs, and file encryption can all be used to protect files that are sent via a network.

Related Questions

  • John wants to write a procedure that addresses what to do if an employee inadver...

    medium
    General Security Concepts
  • How many keys will be used in a typical implementation of record-level encryptio...

    hard
    General Security Concepts
  • What process reviews control objectives for an organization, system, or service...

    medium
    General Security Concepts
  • Drew wants to address a recent Windows vulnerability that has a CVE rating of 9....

    medium
    Threats, Vulnerabilities, and Mitigations
  • While conducting a vulnerability scan of her network, Susan discovers that a mar...

    medium
    Threats, Vulnerabilities, and Mitigations
  • Which of the following controls is typically the most expensive to implement?

    easy
    General Security Concepts
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk