Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.
A. confidentiality
B. integrity
C. availability
D. non-repudiation
Answer: A
Computer Science & Information Technology
You might also like to view...
The best that can be done to determine if a PRNG generates numbers that have the characteristic of randomness is on the basis of multiple tests. These tests should seek to establish uniformity, scalability, and __________ .
A. consistency B. authentication C. frequency D. sequencing
Computer Science & Information Technology
In Twitter, Tweets are limited to 140 characters
Indicate whether the statement is true or false
Computer Science & Information Technology
To delete a database, you use the ____________________ function.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The header node is placed at the ____ of a list.
A. middle B. end C. beginning D. key location
Computer Science & Information Technology