A software company sends their offsite backup tapes to a third party storage facility. TO meet confidentiality the tapes should be:

A. Labeled
B. Hashed
C. Encrypted
D. Duplicated


Answer: A. Labeled

Computer Science & Information Technology

You might also like to view...

Which of the following statements will assign number a value from 90 – 100. A) number = rand() % 90 + 10;

A) number = rand() % 90 + 10; B) number = rand() % 90 + 11; C) number = rand() % 10 + 90; D) number = rand() % 11 + 90; E) None of the above.

Computer Science & Information Technology

____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Explain why transaction management is necessary in systems where user inputs can result in database changes.

What will be an ideal response?

Computer Science & Information Technology

The ________ property of the wave filter determines how many waves will be applied in the affected area.

a) freq b) direction c) phase d) strength

Computer Science & Information Technology