Which of these is NOT a basic security protection for information that cryptography can provide?

A. authenticity
B. risk loss
C. integrity
D. confidentiality


B. risk loss

Computer Science & Information Technology

You might also like to view...

The default summary function for data fields containing numbers in an Excel PivotTable is ________

A) Max B) Average C) Sum D) Count

Computer Science & Information Technology

A common exception that occurs when using linked lists is the:

a. NodeOutOfBoundsException b. NodeEmptyException c. NullPointerException d. NullNodeOccurredException

Computer Science & Information Technology

These devices are associated with intrusion detection and protection.

What will be an ideal response?

Computer Science & Information Technology

Reusable data abstractions can be built using _________________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology