When using data encryption as a method of protecting data, which of the following is true?
A. It makes few demands on system resources
B. It is usually easily administered
C. It requires careful key Management
D. It should sometimes be used for password files
C. It requires careful key Management
Computer Science & Information Technology
You might also like to view...
_____ is the capability to track where you are located or, more accurately, where your phone is located
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following operators ensures that at least one out of multiple conditions is true?
a) || b) && c) == d) ^
Computer Science & Information Technology