Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?
A. Full disk
B. Individual files
C. Database
D. Removable media
Ans: C. Database
Computer Science & Information Technology
You might also like to view...
Lists and tables of values can be stored in __________ or _____________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
char[] itoa(stringExp) converts ____.
A. an integer to a character array B. an ASCII string to a double-precision number C. an ASCII string to an integer D. a double-precision number to an ASCII string
Computer Science & Information Technology
Both WiGig and ____________________ operate in the 60 GHz frequency band, which allows for faster speeds within a single room.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following wireless technologies is LEAST likely to be intercepted by a third party?
A. NFC B. Bluetooth C. WiFi D. Cellular
Computer Science & Information Technology