A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ .

A) integrity
B) encryption
C) analysis
D) masquerade


B) encryption

Computer Science & Information Technology

You might also like to view...

Given:Count = 23, what is the value of Count after the following statement is executed: Count = Count + 2

a. 23 b. 25 c. 48 d. 24

Computer Science & Information Technology

Huemeasures the brightness of the color and ranges from 0% (black) up to100% (white).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Procedural languages are also called ____ languages.

A. immediate B. translated C. interpreted D. imperative

Computer Science & Information Technology