When using data encryption as a method of protecting data, which of the following is true?
A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files
C. It requires careful key Management
Computer Science & Information Technology
You might also like to view...
____ emphasize what happens in a system.
A. Interaction diagrams B. Sequence diagrams C. Structure diagrams D. Behavior diagrams
Computer Science & Information Technology
The ____________________ button looks at the files in both the remote and local folders and replaces any files in either location that have an earlier save date.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology