The ____ process can be performed at the firewall and make use of encryption to protect credentials transmitted from client to server (or client to firewall).
A. integrity
B. confidentiality
C. authentication
D. nonrepudiation
Answer: C
You might also like to view...
The process to ____ software removes programs from the hard drive, removes program names from the All Programs menu, and updates the Registry.
A. remove B. delete C. reinstall D. uninstall
______________ is the amount of signal that is lost as the signal travels through the communications medium.
Fill in the blank(s) with the appropriate word(s).
When you embed an object, the object becomes a self-contained object in the ________ file
Fill in the blank(s) with correct word
Endorsed is one of the seven policy characteristics. Which of the following statements best describes endorsed?
A. The policy is supported by management. B. The policy is accepted by the organization's employees. C. The policy is mandatory; compliance is measured; and appropriate sanctions are applied. D. The policy is regulated by the government.