Which of the following can be used to protect the confidentiality of information?
a. Encryption
b. Auditing
c. Backups
d. Network server redundancy
ANS: A
You might also like to view...
The TCSAFLUSH command to tcsetattr tells the driver to
A. discard all input and output B. discard all unread input
Jim is making a video about himself and his friends. Jim has a few pictures on his digital camera that he wants to transfer to his computer. In order to do this, Jim has to ____.
A. use a digital capture device to convert the analog data from his camera into digital format B. find a way to decrypt the protected files on his camera C. connect his camera to the computer and use video editing software to control the data transfer D. e-mail his photos to his PC from his camera
____ is/are used to create an attractive environment for users that's easier to use than a command-line interface.
A. Classes and objects B. Pseudocode C. Graphical user interfaces D. Flowcharts
If a hard link is created to a file and then the original file is deleted, which of the following is true?
A. Both the original file and the hard link are removed. B. An error message will be displayed preventing the deletion of the original file. C. The original file will be removed while the hard link remains, though the content will not be accessible. D. The original file will be removed while the hard link remains usable to access the contents of the file.