The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

A) security
B) key management
C) authentication
D) confidentiality

A) security

Computer Science & Information Technology

You might also like to view...

The width and height attributes may be used to specify the size of an inline frame

Indicate whether the statement is true or false

Computer Science & Information Technology

________ involves the fraudulent use of stolen or fictitious personal information to obtain employment or to gain entry into the United States

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology