Which of the following can Matt, an administrator, use to ensure the confidentiality of a file when it is being sent over FTP?
A. WPA2
B. PGP
C. MD5
D. NTLMv2
Ans: B. PGP
You might also like to view...
To the extent that creativity is _______, a computer can be creative.
Fill in the blank(s) with the appropriate word(s).
If you press Enter after typing in five underscore characters:
A) a page break is inserted. B) five more underscore characters will be inserted. C) the underscore characters will be converted to a hyphen. D) they are converted into a horizontal line.
Critical Thinking Questions Case 8-2 ? Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she has never before taken the time to learn the names of the actual dialog box features aligned with their functions. ?If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use?
A. ?Text box B. ?List box C. ?Drop-down list box D. ?Toggle button
What is the name of the process used to verify that the input data is within the expected range?
A. Data validation B. Triage C. Data capping D. Data heuristics