Which of the following can be used to ensure that sensitive records stored on a backend server can only be accessed by a front end server with the appropriate record key?

A. File encryption
B. Storage encryption
C. Database encryption
D. Full disk encryption


Answer: A. File encryption

Computer Science & Information Technology

You might also like to view...

Which of the following is most susceptible to ESD?

A) Flash memory B) Thumb drive C) BIOS D) RAM

Computer Science & Information Technology

Which of the following could be a valid voltage coming from the power supply to one of the computer components?

A) +9 volts B) +6 volts C) +3.3 volts D) 112 volts

Computer Science & Information Technology

Computational tasks are tasks for which accurate answers need not be found. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When it comes to describing a computer's storage or memory we commonly use the unit known as the ________, which is simply a collection of eight bits.

A. byte B. port C. cache D. pixel

Computer Science & Information Technology