What is the most appropriate use of IPSec?
A. Processing encryption
B. Storage encryption
C. Data transmission protection
D. Database protection
Answer: C. Data transmission protection
Computer Science & Information Technology
You might also like to view...
Before conducting a security test by using social-engineering tactics, what should you do?
a. Set up an appointment. b. Document all findings. c. Get written permission from the person who hired you to conduct the security test. d. Get written permission from the department head.
Computer Science & Information Technology
Computer scientists use the term __________ to describe the interconnections that link a computer’s components.
a. interface b. bus c. architecture d. none of the above
Computer Science & Information Technology