When using data encryption as a method of protecting data, which of the following is true?

A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files

C. It requires careful key Management

Computer Science & Information Technology

You might also like to view...

_____ is the capability to track where you are located or, more accurately, where your phone is located

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following operators ensures that at least one out of multiple conditions is true?

a) || b) && c) == d) ^

Computer Science & Information Technology