Using the Cryptographic API, enables users to encrypt ________.

a) data on a hard disk
b) data for network transfer
c) kernel data structures
d) both a and b


d) both a and b

Computer Science & Information Technology

You might also like to view...

When the Refine Edge button is clicked, it opens a dialog box in which you can ____.

a. change the contrast b. increase or decrease the radius of the marquee c. smooth the selection border d. any of the above

Computer Science & Information Technology

Word's ________ Properties can be used to check document statistics, such as the date the

document was created, the total editing time, or the number of words in a document. Fill in the blank(s) with correct word

Computer Science & Information Technology

All of the following are valid elements for creating row groups EXCEPT:

A) B) C) D)

Computer Science & Information Technology

Mobile users are connecting from sites that have strong security policies and filter most traffic except HTTPS. Which of the following would be the BEST solution to allow them access to the corporate network?

A. Dial-in access B. RDP access C. IPSec VPN D. SSL VPN

Computer Science & Information Technology