When using data encryption as a method of protecting data, which of the following is true?

A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files

C. It requires careful key Management

Computer Science & Information Technology

You might also like to view...

____ emphasize what happens in a system.

A. Interaction diagrams B. Sequence diagrams C. Structure diagrams D. Behavior diagrams

Computer Science & Information Technology

The ____________________ button looks at the files in both the remote and local folders and replaces any files in either location that have an earlier save date.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology