Which of the following can Matt, an administrator, use to ensure the confidentiality of a file when it is being sent over FTP?

A. WPA2
B. PGP
C. MD5
D. NTLMv2


Ans: B. PGP

Computer Science & Information Technology

You might also like to view...

To the extent that creativity is _______, a computer can be creative.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you press Enter after typing in five underscore characters:

A) a page break is inserted. B) five more underscore characters will be inserted. C) the underscore characters will be converted to a hyphen. D) they are converted into a horizontal line.

Computer Science & Information Technology

Critical Thinking Questions Case 8-2 ? Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she has never before taken the time to learn the names of the actual dialog box features aligned with their functions. ?If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use?

A. ?Text box B. ?List box C. ?Drop-down list box D. ?Toggle button

Computer Science & Information Technology

What is the name of the process used to verify that the input data is within the expected range?

A. Data validation B. Triage C. Data capping D. Data heuristics

Computer Science & Information Technology