What security term describes scrambling data so that it cannot be read?
A) Encryption
B) Authentication
C) Authorization
D) Auditing
A
Computer Science & Information Technology
You might also like to view...
The ____ are the foundation of a security framework.
A. spheres of security B. NIST documents C. layered implementations of security D. CIA triads
Computer Science & Information Technology
In the browser object model, ____ is contained inside of the forms[] array.
A. elements[] B. images[] C. navigator D. links[]
Computer Science & Information Technology
The code for the page background color is located in the ____________________ section.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
All classes extend which built-in class?
a) Main b) Object c) Simple d) Super
Computer Science & Information Technology