When using data encryption as a method of protecting data, which of the following is true?
A. It makes few demands on system resources
B. It should sometimes be used for password files
C. It is usually easily administered
D. It requires careful key Management
D. It requires careful key Management
Computer Science & Information Technology
You might also like to view...
Many character formatting options are available on the HOME tab, in the ________ group
A) Paragraph B) Font C) Styles D) Editing
Computer Science & Information Technology
The tumbler lock is the most secured type of key lock
Indicate whether the statement is true or false.
Computer Science & Information Technology
Which of the following is the least likely technology PANs would use?
A. Bluetooth B. peer-to-peer C. Wi-Fi D. special USB cables
Computer Science & Information Technology
A(n) ________ is a button or area within a group that you click to perform a task.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology