Information Technology Specialist (ITS) Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Study for the ITS Cybersecurity Exam. Test yourself with flashcards and multiple choice questions, each featuring hints and explanations. Get ready for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which two states of data domains require encryption and hashing for data security?

  1. Data at rest and Data in transit

  2. Data in use and Data at rest

  3. Data at rest and Data in processing

  4. Data in transit and Data in use

The correct answer is: Data at rest and Data in transit

The correct answer highlights the importance of securing data both at rest and in transit, as these states are particularly vulnerable to unauthorized access and interception. Data at rest refers to information stored on physical devices or storage media, such as databases and hard drives. This data is vulnerable to theft or unauthorized access when it's not being accessed or transmitted. Implementing encryption ensures that even if an unauthorized individual accesses the storage medium, they cannot read or utilize the data without the decryption key. Data in transit, on the other hand, involves data being transmitted over networks, whether that's across the internet or within a private network. During this state, data can be intercepted by attackers. Utilizing encryption for data in transit protects the information from being read by interceptors, ensuring confidentiality and integrity during transmission. In contrast, while data in use (which is actively being processed or accessed by applications) also has security requirements, it is typically protected through different techniques such as access controls and secure coding practices rather than encryption and hashing. Hashing, while useful for verifying data integrity, is not a primary method for securing data in use, as it is not reversible and typically does not provide confidentiality.