What security term describes scrambling data so that it cannot be read?

A) Encryption
B) Authentication
C) Authorization
D) Auditing


A

Computer Science & Information Technology

You might also like to view...

The ____ are the foundation of a security framework.

A. spheres of security B. NIST documents C. layered implementations of security D. CIA triads

Computer Science & Information Technology

In the browser object model, ____ is contained inside of the forms[] array.

A. elements[] B. images[] C. navigator D. links[]

Computer Science & Information Technology

The code for the page background color is located in the ____________________ section.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All classes extend which built-in class?

a) Main b) Object c) Simple d) Super

Computer Science & Information Technology