Hashes provide _______, but not _______.

A. Integrity, confidentiality
B. Availability, integrity
C. Confidentiality, availability
D. Confidentiality, integrity
E. Integrity, availability


Answer: A. Integrity, confidentiality

Computer Science & Information Technology

You might also like to view...

A user style created with the Create New Style from Formatting option is available in:

A) all Word documents. B) all Microsoft Office documents. C) only the document in which it was created. D) all Word documents open when the style was created.

Computer Science & Information Technology

A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology Officer issued a memorandum to the IT department with a directive to reduce power and cooling consumptions by 50% in the datacenters. Which of the following should the system administrators recommend?

A. Implement 208V 3-phase servers B. Implement hot aisle / cold aisle C. Virtualize the servers in the datacenter D. Replace each server with a blade server

Computer Science & Information Technology

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

a. Update the BIOS using the latest version b. Run CHKDSK c. Re-join the computer to the domain d. Reboot the PC as the domain will automatically rebuild the relationship

Computer Science & Information Technology

With a user story, storyboard-sketches, and transition diagram in hand, the program's ____ is done.

A. implementation B. design C. testing D. development

Computer Science & Information Technology