Which facet of securing access to network data makes data unusable to anyone except authorized users?
A. encryption
B. authentication
C. malware protection
D. security devices
Answer: A
Computer Science & Information Technology
You might also like to view...
If aFor loop’s increment is positive, then the body of the loop will not be executed if the initial value is __________ _________ the limiting value.
Fill in the blank(s) with correct word
Computer Science & Information Technology
37. __________ was the first commercially successful graphical user interface.
a. Windows b. The Apple Macintosh c. MS-DOS d. UNIX
Computer Science & Information Technology