This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
A. Authentication
B. Encryption
C. Ciphertext
D. Decryption
Answer: B
You might also like to view...
Deploying software using a GPO requires that you use the Universal Naming Convention (UNC). Why is this required?
a. Users will be unable to locate the package. b. Operating systems other than Windows may need to access GPO. c. Use of the UNC is not necessary. d. None of the above.
Match each item with the correct statement below.
A. Used to give pictures the appearance of being framed. B. A quick method for totaling numbers in a column or row. C. Makes selected rows equal in height. D. A fill effect similar to Parchment that can be used to provide page color for formal documents. E. F. Allows you to make changes to the table styles. G. The first row in a table. H. Command used to choose a specific location for a graphic on the page. I. Aligns numbers containing decimals in a column. J. Use this type of watermark to place an image behind text. K. Rotates text from horizontal to vertical position.