A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type of encryption is performed while data is in transit?

A. SSH
B. SHA1
C. TPM
D. MD5


Answer: C. TPM

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) A program is more efficient if it uses more CPU time 2) One of the ways to express the size of a problem is in terms of the number of items to be processed. 3) If the growth function for an algorithm is expressed as a polynomial, then the asymptotic complexity of the algorithm is determined by the term with the smallest exponent of the variable. 4) The asymptotic complexity of an algorithm is also called the order of the algorithm. 5) All of the terms in a growth function contribute to the order of the function

Computer Science & Information Technology

Analyze the following code.

``` class Test { public static void main(String[] args) { String s; System.out.println("s is " + s); } }``` a. The program has a compile error because s is not initialized, but it is referenced in the println statement. b. The program has a runtime error because s is not initialized, but it is referenced in the println statement. c. The program has a runtime error because s is null in the println statement. d. The program compiles and runs fine.

Computer Science & Information Technology

Click a thumbnail in the Navigation pane to display a specific page in a document

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is an example of a single factor authentication?

A. Password and PIN B. Smart card and token C. USB drive and fingerprint recognition D. Fingerprint recognition and password

Computer Science & Information Technology