_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. Encryption
B. Prevention
C. Decryption
D. Restriction
查看答案
_______ scanning devices use fingerprints and iris scanners to identify individuals.
A. Visual
Biometric
C. Optical
D. Virtual
_______ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
A. Loggers
Biometrics
C. Virtual private networks
D. Web bugs
_______ is concerned with protecting software and data from unauthorized tampering or damage.
A. Cloud computing
B. Decryption
C. Phishing
Data security
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team