______________ is the process to scramble a message or other information so that it cannot be easily read
a. Encryption
b. Cryptography
c. Keying
d. Decryption
Answer A.
You might also like to view...
Firewalls work by closing ___________ in your computer
a. logical ports c. logical doors b. software gaps d. backdoors
A(n) __________________ is both the acceptance of IP settings from a DHCP client and the amount of time that the client may hold the IP configuration before it must renew.
Fill in the blank(s) with the appropriate word(s).
Digital signatures are used for ________ authentication.
initial message-by-message Both initial and message-by-message Neither initial nor message-by-message
Which statements about data warehousing is not correct?
A. The data warehouse should be separate from the operational system. B. Data cleansing is a process of transforming data into standard form. C. Drill-down is a data-mining tool available to users of OLAP. D. Normalization is an requirement of databases included in a data warehouse.