The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.?
A. ?firewall
B. ?Trojan horse
C. ?Data Encryption Standard (DES)
D. ?TCP
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following statements best describes media viability controls?
A. Used to track and approve changes to a system B. Ensures security is not breached when a computer system crashes C. Used to determine how long records should be kept D. Used to clearly mark and handle assets
Computer Science & Information Technology
Term “infix” indicates that every binary operator appears where?
a. between its operands b. after its operands c. before its operands d. before each operand
Computer Science & Information Technology