How can data be protected while it is being transmitted?

A. It can be encrypted using a cryptographic system
B. It can be encrypted using a hashing system.
C. It can be hashed using a hashing system.
D. It can be hashed using a cryptographic system.


A. It can be encrypted using a cryptographic system

Computer Science & Information Technology

You might also like to view...

When you target an area, the Replace Color dialog box shows you a black-and-white mask, with the black areas representing the pixels that will be affected by any changes you make.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What types of form fields can you create with InDesign CC?

What will be an ideal response?

Computer Science & Information Technology

A power supply converts _____ to ______

Fill in the blank(s) with correct word

Computer Science & Information Technology

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology