Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
A) Encryption
Computer Science & Information Technology
You might also like to view...
________ are a collection of Google+ friends who share some characteristic organized into a single group
Fill in the blank(s) with correct word
Computer Science & Information Technology
A company decides to implement a redundant network backbone. Which tenet will this cover?
A. Confidentiality B. Integrity C. Availability D. Authentication
Computer Science & Information Technology