If requesting the application to provide sensitive information over the public network can sometimes be too risky, what should be done?

A. Take the chance and send the data
B. Log all activity
C. Send it but encrypt the data
D. Requiring Physical Requests for Data


Answer: D

Computer Science & Information Technology

You might also like to view...

The Application Gallery can be used for setting up federation for SaaS programs as well as which of the following?

A) Adding applications your organization is developing B) Adding programs your partners are developing C) Adding programs that are connected to the Apple Store D) Adding programs that are set up through the App Studio Platform E) All of the above

Computer Science & Information Technology

What is meant by the zero-dispersion wavelength?

What will be an ideal response?

Computer Science & Information Technology

Information and images to be viewed on all handouts are entered on the ________

A) Notes Master B) Handout Master C) Presentation Master D) Slide Master

Computer Science & Information Technology

Details about the Excel workbook that describe or identify the file, including the title, author name, subject, and keywords that identify the file's topic or contents, are called:

A) shared information. B) documents. C) identifiers. D) properties.

Computer Science & Information Technology