Which facet of securing access to network data makes data unusable to anyone except authorized users?

A. encryption
B. authentication
C. malware protection
D. security devices

Answer: A

Computer Science & Information Technology

You might also like to view...

If aFor loop’s increment is positive, then the body of the loop will not be executed if the initial value is __________ _________ the limiting value.

Fill in the blank(s) with correct word

Computer Science & Information Technology

37. __________ was the first commercially successful graphical user interface.

a. Windows b. The Apple Macintosh c. MS-DOS d. UNIX

Computer Science & Information Technology