Which of the following provides confidentiality?

A) Encryption
B) Decryption
C) Hashing
D) Key management


A) Encryption

Computer Science & Information Technology

You might also like to view...

The ________ keystroke moves the selection to the previous field in the table

A) Shift + Tab B) Page Down C) Tab D) PageUp

Computer Science & Information Technology

When you ________, you hold down the left mouse button, carry out a task such as highlighting text or moving an object and then release the mouse button at the appropriate time

A) paste B) drag C) paste special D) toggle

Computer Science & Information Technology

Using Linux to wipe the target drive, the command-line command would be ___

a. cc b. dd c. nd d. md5sum

Computer Science & Information Technology

Restore points are created at regular intervals and just before you install software or hardware by what utility?

A. System Activation B. System Protection C. System Restoration D. System Prevention

Computer Science & Information Technology