When using data encryption as a method of protecting data, which of the following is true?

A. It makes few demands on system resources
B. It should sometimes be used for password files
C. It is usually easily administered
D. It requires careful key Management


D. It requires careful key Management

Computer Science & Information Technology

You might also like to view...

Many character formatting options are available on the HOME tab, in the ________ group

A) Paragraph B) Font C) Styles D) Editing

Computer Science & Information Technology

The tumbler lock is the most secured type of key lock

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which of the following is the least likely technology PANs would use?

A. Bluetooth B. peer-to-peer C. Wi-Fi D. special USB cables

Computer Science & Information Technology

A(n) ________ is a button or area within a group that you click to perform a task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology