File encryption protects the confidentiality and integrity of information during transmission and storage. It ensures that only authorized recipients can access the data by converting it into an unreadable format.
Option A (Firewalls) – Prevents unauthorized access to networks but does not secure data exchange.
Option B (Activity logs) – Tracks actions but does not protect data confidentiality.
Option C (Antivirus software) – Protects against malware but does not encrypt data in transit.
Thus, file encryption (Option D) is the best security control for protecting exchanged information.
[Reference: IIA IT Security & Encryption Controls, , , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit