Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

A. ?hotspots
B. ?encryption
C. ?wireframes
D. ?viewports


Answer: B

Computer Science & Information Technology

You might also like to view...

Layer 6 of the OSI model is called the __________________ layer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

COGNITIVE ASSESSMENT You have a programmer/developer certification. What is NOT a match for your next job?

A. game developer B. web developer C. IT consultant D. HR manager

Computer Science & Information Technology

What Windows utility can be used to find out what processes are launched at startup?

A. Task Manager B. Microsoft Management Console C. System Configuration D. Computer Management

Computer Science & Information Technology

_____ software addresses the needs that are common across businesses, organizations, or individuals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology