Which of the following mitigates the risk of proprietary information being compromised?

A. Cloud computing
B. Digital signatures
C. File encryption
D. Virtualization


Ans: C. File encryption

Computer Science & Information Technology

You might also like to view...

Describe the Bring your own device (BYOD) deployment model.

What will be an ideal response?

Computer Science & Information Technology

All of the following are arithmetic operators used in Excel, except _____.

A. x (multiplication) B. ^ (exponent) C. % (percent) D. + (addition)

Computer Science & Information Technology

When you create a set of pages that presents information in two levels of detail, the ____ page lists all the records in the recordset that you create for the page.

A. master B. outer C. nested D. detail

Computer Science & Information Technology

When a company completes a background check, the company must comply with the ________ regulations

A) Privacy Act of 1974 B) Freedom of Information Act (FOIA) C) Fair Credit Reporting Act (FCRA) D) Free Flow of Information Act 2013

Computer Science & Information Technology