Which of the following should you use to protect your customer's sensitive data from being accessed by unauthorized people?
A. HTTP
B. FTP
C. HTTPS
D. HTML5
Answer: C
You might also like to view...
Operating systems provide persistence transparency by __________.
a) hiding the location of resources b) hiding the fact that multiple copies of a resource are available c) hiding the location where the resource is stored d) hiding the movement of components among computers in a distributed system
Access has a ________ report that can be used for mailing labels, name tags, or other types of labels
A) customized B) merged C) summarized D) specialized
A smart chipĀ is an authentication component, similar to a dumb card, that contains a computerĀ chip to verify and validate several pieces of information instead of just a PIN. __________
Answer the following statement true (T) or false (F)
A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?
a. 64 b. 32 c. 128 d. 16