Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?

A. Full disk
B. Individual files
C. Database
D. Removable media


Ans: C. Database

Computer Science & Information Technology

You might also like to view...

Lists and tables of values can be stored in __________ or _____________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

char[] itoa(stringExp) converts ____.

A. an integer to a character array B. an ASCII string to a double-precision number C. an ASCII string to an integer D. a double-precision number to an ASCII string

Computer Science & Information Technology

Both WiGig and ____________________ operate in the 60 GHz frequency band, which allows for faster speeds within a single room.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following wireless technologies is LEAST likely to be intercepted by a third party?

A. NFC B. Bluetooth C. WiFi D. Cellular

Computer Science & Information Technology