Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data’s encryption key?

A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense


C) Cryptographic erase

Computer Science & Information Technology

You might also like to view...

When creating a new program in Visual Basic, you are asked to supply a name for the program. If you do not specify a name, a default name is used. What is this default name?

(A) Wapplication followed by a number. (B) Application followed by a number. (C) WindowsApplication. (D) WindowsApplication followed by a number.

Computer Science & Information Technology

What does the following code do?

``` public int mystery(int a, int b) { if (b == 1) { return a; } else { return a + mystery(a, b - 1); } } ```

Computer Science & Information Technology

________ is the most common desktop operating system

Fill in the blank(s) with correct word

Computer Science & Information Technology

To delete a building block, a document must be open so that the ________ command is active

A) Apps B) Building Block C) Quick Parts D) Track Changes

Computer Science & Information Technology