The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.
A) security
B) key management
C) authentication
D) confidentiality
A) security
Computer Science & Information Technology
You might also like to view...
The width and height attributes may be used to specify the size of an inline frame
Indicate whether the statement is true or false
Computer Science & Information Technology
________ involves the fraudulent use of stolen or fictitious personal information to obtain employment or to gain entry into the United States
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology