Which file action implements the principle of confidentiality from the CIA triad?
A. Compression
B. Hash
C. Backup
D. Encryption
Answer: D. Encryption
You might also like to view...
Function mismatch returns:
a. The position number where the two specified sequences do not match. b. A pair containing the two elements in the specified sequences that do not match. c. A pair containing two iterators pointing to the two locations in the specified sequences that do not match. d. A bool indicating whether the two specified sequences do not match.
An item that separates other items is known as a
a. partition b. delimiter c. sentinel d. terminator
Open Read-Only opens the database so that changes can be made, but on one else may open the database at the same time
Indicate whether the statement is true or false
When you create a PivotTable report the fields in your table that describe the values are positioned as row or column labels
Indicate whether the statement is true or false