题目内容

Security measures consist of.

A. encryption
B. restricting access
C. data layering and backing up data
D. all of the above

查看答案
更多问题

The most powerful tool in rpoviding computer security is.

A. transforming data
B. restricting access
C. coding
D. backing up data

can be used to achieve integrity and secrecy for data.

A. Restricting access
B. Encryption
C. Data layering
D. Backing up data

It is very important that we should not in protecting computer system.

A. display our passwords for everyone to see
B. open unidentified files
C. leave computer terminals on while we are away from our desks
D. all of the above

All electronic communications coming into and leaving the corporation must be evaluated by the.

A. passwords
B. firewall
C. gateway
D. buffer

答案查题题库