A. encryption B. restricting access C. data layering and backing up data D. all of the above
A. transforming data B. restricting access C. coding D. backing up data
A. Restricting access B. Encryption C. Data layering D. Backing up data
A. display our passwords for everyone to see B. open unidentified files C. leave computer terminals on while we are away from our desks D. all of the above
A. passwords B. firewall C. gateway D. buffer