Which of the following can be used to ensure that sensitive records stored on a backend server can only be accessed by a front end server with the appropriate record key?
A. File encryption
B. Storage encryption
C. Database encryption
D. Full disk encryption
Answer: A. File encryption
Computer Science & Information Technology
You might also like to view...
Which of the following is most susceptible to ESD?
A) Flash memory B) Thumb drive C) BIOS D) RAM
Computer Science & Information Technology
Which of the following could be a valid voltage coming from the power supply to one of the computer components?
A) +9 volts B) +6 volts C) +3.3 volts D) 112 volts
Computer Science & Information Technology
Computational tasks are tasks for which accurate answers need not be found. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When it comes to describing a computer's storage or memory we commonly use the unit known as the ________, which is simply a collection of eight bits.
A. byte B. port C. cache D. pixel
Computer Science & Information Technology