Security measures consist of.
A. encryption
B. restricting access
C. data layering and backing up data
D. all of the above
The most powerful tool in rpoviding computer security is.
A. transforming data
B. restricting access
C. coding
D. backing up data
can be used to achieve integrity and secrecy for data.
A. Restricting access
B. Encryption
C. Data layering
D. Backing up data