A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .
A) integrity
B) encryption
C) analysis
D) masquerade
B) encryption
Computer Science & Information Technology
You might also like to view...
Given:Count = 23, what is the value of Count after the following statement is executed: Count = Count + 2
a. 23 b. 25 c. 48 d. 24
Computer Science & Information Technology
Huemeasures the brightness of the color and ranges from 0% (black) up to100% (white).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Procedural languages are also called ____ languages.
A. immediate B. translated C. interpreted D. imperative
Computer Science & Information Technology