Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
A) Encryption
You might also like to view...
This protocol is used to send data over the Internet or other networks.
What will be an ideal response?
Crawlers crawl less than ________ of the Web.
Fill in the blank(s) with the appropriate word(s).
A thread gains access to a resource with a nonempty discretionary access control list (DACL) if ________.
a) the first ACE (access control entry) in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource b) no ACE in the resource's DACL denies access to any of the SIDs in the thread's access token c) one of the ACEs in the resource's DACL that matches one of the SIDs in the thread's access token grants that security principal access to the resource d) for each SID in the thread's access token, there is an ACE in the resource's DACL that grants access to the resource
The standard output stream is named ____.
A. stdin B. stdout C. instream D. ostream