Which of the following can be used to protect the confidentiality of information?

A) Encryption
B) Auditing
C) Backups
D) Network server redundancy


A) Encryption

Computer Science & Information Technology

You might also like to view...

This protocol is used to send data over the Internet or other networks.

What will be an ideal response?

Computer Science & Information Technology

Crawlers crawl less than ________ of the Web.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A thread gains access to a resource with a nonempty discretionary access control list (DACL) if ________.

a) the first ACE (access control entry) in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource b) no ACE in the resource's DACL denies access to any of the SIDs in the thread's access token c) one of the ACEs in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource d) for each SID in the thread's access token, there is an ACE in the resource's DACL that grants access to the resource

Computer Science & Information Technology

The standard output stream is named ____.

A. stdin B. stdout C. instream D. ostream

Computer Science & Information Technology