Which of the following should you use to protect your customer's sensitive data from being accessed by unauthorized people?

A. HTTP
B. FTP
C. HTTPS
D. HTML5


Answer: C

Computer Science & Information Technology

You might also like to view...

Operating systems provide persistence transparency by __________.

a) hiding the location of resources b) hiding the fact that multiple copies of a resource are available c) hiding the location where the resource is stored d) hiding the movement of components among computers in a distributed system

Computer Science & Information Technology

Access has a ________ report that can be used for mailing labels, name tags, or other types of labels

A) customized B) merged C) summarized D) specialized

Computer Science & Information Technology

A smart chipĀ is an authentication component, similar to a dumb card, that contains a computerĀ chip to verify and validate several pieces of information instead of just a PIN. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?

a. 64 b. 32 c. 128 d. 16

Computer Science & Information Technology