A company needs to receive data that contains personally identifiable information. The company requires both the transmission and data at rest to be encrypted. Which of the following achieves this goal?

A. SSH
B. TFTP
C. NTLM
D. TKIP
E. SMTP
F. PGP/GPG


Answer:
A. SSH
F. PGP/GPG

Computer Science & Information Technology

You might also like to view...

____________________ are the foundation for all types of organizational control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is NOT true about creating new databases?

A) When you create a new database, you can design it yourself starting with an empty database. B) You can use a template; however, you need to create your own forms and reports. C) If you design your own database, you develop the tables, fields, and the relationships between the tables. D) If you build your own database, you need to decide what information you want to keep in your database, how this information should be grouped into tables, what relationships you need, and what queries and reports you need.

Computer Science & Information Technology

What is the purpose of an Excel What-if scenario?

A. A two-variable goal seek tool B. Any what-if analysis C. A tool that changes one variable through several iterations D. Detailed set of values that represent different possible situations

Computer Science & Information Technology

A user reports the computer network seems slow. The user's office had one network port available, but the user needed to add more network devices. The user located an older network device that allowed multiple connections. However, the network performance decreased due to collisions. Which of the following explains the cause of this issue?

A. The user connected a bridge B. The user connected a router C. The user connected a switch D. The user connected a hub

Computer Science & Information Technology