Which of the following can be used to protect the confidentiality of information?

A) Encryption
B) Auditing
C) Backups
D) Network server redundancy

A) Encryption

Computer Science & Information Technology

You might also like to view...

________ are a collection of Google+ friends who share some characteristic organized into a single group

Fill in the blank(s) with correct word

Computer Science & Information Technology

A company decides to implement a redundant network backbone. Which tenet will this cover?

A. Confidentiality B. Integrity C. Availability D. Authentication

Computer Science & Information Technology