The ____ process can be performed at the firewall and make use of encryption to protect credentials transmitted from client to server (or client to firewall).

A. integrity
B. confidentiality
C. authentication
D. nonrepudiation


Answer: C

Computer Science & Information Technology

You might also like to view...

The process to ____ software removes programs from the hard drive, removes program names from the All Programs menu, and updates the Registry.

A. remove B. delete C. reinstall D. uninstall

Computer Science & Information Technology

______________ is the amount of signal that is lost as the signal travels through the communications medium.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you embed an object, the object becomes a self-contained object in the ________ file

Fill in the blank(s) with correct word

Computer Science & Information Technology

Endorsed is one of the seven policy characteristics. Which of the following statements best describes endorsed?

A. The policy is supported by management. B. The policy is accepted by the organization's employees. C. The policy is mandatory; compliance is measured; and appropriate sanctions are applied. D. The policy is regulated by the government.

Computer Science & Information Technology