When using data encryption as a method of protecting data, which of the following is true?
A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files
C. It requires careful key Management
You might also like to view...
If the item being searched for is not in the array, binary search stops looking for it and reports that it is not there when
A) array index first > array index last. B) Boolean variable found equals false. C) Boolean variable found equals true. D) it finds a value larger than the search key. E) it has examined all the elements in the array.
In VBA a macro is called a ________
A) process B) function C) procedure D) subroutine
Which logical unit of the computer sends information that has already been processed by the computer to various devices so that the information may be used outside the computer? _______ .
Fill in the blank(s) with the appropriate word(s).
Which of the following protocols must be implemented in order for two switches to share VLAN information?
A. VTP B. MPLS C. STP D. PPTP