Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data’s encryption key?
A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense
C) Cryptographic erase
You might also like to view...
When creating a new program in Visual Basic, you are asked to supply a name for the program. If you do not specify a name, a default name is used. What is this default name?
(A) Wapplication followed by a number. (B) Application followed by a number. (C) WindowsApplication. (D) WindowsApplication followed by a number.
What does the following code do?
``` public int mystery(int a, int b) { if (b == 1) { return a; } else { return a + mystery(a, b - 1); } } ```
________ is the most common desktop operating system
Fill in the blank(s) with correct word
To delete a building block, a document must be open so that the ________ command is active
A) Apps B) Building Block C) Quick Parts D) Track Changes