Security measures consist of.
A. encryption
B. restricting access
C. data layering and backing up data
D. all of the above
查看答案
The most powerful tool in rpoviding computer security is.
A. transforming data
B. restricting access
C. coding
D. backing up data
can be used to achieve integrity and secrecy for data.
A. Restricting access
B. Encryption
C. Data layering
D. Backing up data
It is very important that we should not in protecting computer system.
A. display our passwords for everyone to see
B. open unidentified files
C. leave computer terminals on while we are away from our desks
D. all of the above
All electronic communications coming into and leaving the corporation must be evaluated by the.
A. passwords
B. firewall
C. gateway
D. buffer