The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.?

A. ?firewall
B. ?Trojan horse
C. ?Data Encryption Standard (DES)
D. ?TCP

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements best describes media viability controls?

A. Used to track and approve changes to a system B. Ensures security is not breached when a computer system crashes C. Used to determine how long records should be kept D. Used to clearly mark and handle assets

Computer Science & Information Technology

Term “infix” indicates that every binary operator appears where?

a. between its operands b. after its operands c. before its operands d. before each operand

Computer Science & Information Technology