Josie is the owner of www.flowersbyjosie.biz, an online floral merchant that sells to individual consumers. Josie wants to protect her customers' personal data from hackers using ____ to pilfer data as it travels over networks.

A. keyword stuffers
B. protocol analyzers
C. VPNs
D. Web crawlers


Answer: B

Computer Science & Information Technology

You might also like to view...

The length of breaks in a presentation is controlled by ________

A) Transition Duration B) Timed break slides C) Action Buttons D) Action settings

Computer Science & Information Technology

Which of the following areas of a PivotTable field list enables you to display average values?

A) COLUMN Areas B) FILTERS Areas C) ROWS Area D) VALUES Area

Computer Science & Information Technology

Format the PivotTable or PivotChart so it is easy to read and your audience understands what it is you are trying to communicate

Indicate whether the statement is true or false

Computer Science & Information Technology

Which router command can be used to check whether the router interfaces are properly configured?

A) router# show ip interface brief B) router(config-router)# show interface ip brief C) router(config)# show ip interface brief D) router> show interface ip brief

Computer Science & Information Technology