Which of the following provides confidentiality?
A) Encryption
B) Decryption
C) Hashing
D) Key management
A) Encryption
Computer Science & Information Technology
You might also like to view...
The ________ keystroke moves the selection to the previous field in the table
A) Shift + Tab B) Page Down C) Tab D) PageUp
Computer Science & Information Technology
When you ________, you hold down the left mouse button, carry out a task such as highlighting text or moving an object and then release the mouse button at the appropriate time
A) paste B) drag C) paste special D) toggle
Computer Science & Information Technology
Using Linux to wipe the target drive, the command-line command would be ___
a. cc b. dd c. nd d. md5sum
Computer Science & Information Technology
Restore points are created at regular intervals and just before you install software or hardware by what utility?
A. System Activation B. System Protection C. System Restoration D. System Prevention
Computer Science & Information Technology