Which of the following methods should be used when classified or sensitive data is stored on a server?

A. Directory encryption
B. Whole disk encryption
C. File encryption
D. Partition encryption


Answer: B. Whole disk encryption

Computer Science & Information Technology

You might also like to view...

All generic method declarations have a type parameter section delimited by __________.

a. curly brackets ({ and }). b. angle brackets (< and >). c. square brackets ([ and ] ). d. parenthesis.

Computer Science & Information Technology

Using for loops and using the same techniques as the pyramid function, create a textsquare function that takes in two values as input: the character to use in making the square, and the size of the square in characters. Then print out a square of that many characters. Using for loops and using the same techniques as the pyramid function, create a textsquare function that takes in two values as input: the character to use in making the square, and the size of the square in characters. Then print out a square of that many characters.

What will be an ideal response?

Computer Science & Information Technology

A comical animated character on a Web page is likely run using a program called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How do you duplicate a layer?

A. Choose Duplicate Layer on the Layer menu, then click OK. B. Activate the layer you want to duplicate, click the Layer Options button, and pick Duplicate from the Layer Options menu. C. Click the layer you want to duplicate to activate it, click the Layers Panel options button, click Duplicate Layer, and then click OK. D. Choose Layers from the Tools Menu, then select Duplicate Layer

Computer Science & Information Technology