Which of the following provides confidentiality?
A. Encryption
B. Decryption
C. Hashing
D. Key management
Answer: A
Explanation: Encryption is the process of converting a plan text to cipher text and can provide confidentiality. Hashing is the process of creating a numeric value that represents the original text and can provide integrity. Decryption is the process of converting cipher text to plain text. Key management is the process of protecting the encryption keys.
You might also like to view...
The Windows Registry is composed of two elements: ________and values
Fill in the blank(s) with the appropriate word(s).
class rectangleType{public:void setLengthWidth(double x, double y);//Postcondition: length = x; width = y;void print() const;//Output length and width;double area();//Calculate and return the area of the rectangle;double perimeter();//Calculate and return the parameter;rectangleType();//Postcondition: length = 0; width = 0;rectangleType(double x, double y);//Postcondition: length = x; width = y;private: double length; double width;}; Consider the accompanying class definition, and the object declaration:rectangleType bigRect(14,10); Which of the following statements is correct?
A. bigRect.setLengthWidth(); B. bigRect.setLengthWidth(3.0, 2.0); C. bigRect.length = 2.0; D. bigRect.length = bigRect.width;
To which list implementation does the following loop condition for the search operation belong?loop (target not equal to pLoc key AND pLoc link not equal to startAddress)
A. linked list B. circularly linked list C. doubly linked list D. multilinked list
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
Answer the following statement true (T) or false (F)