The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. Restriction
B. Security
C. Protection
D. Encryption
查看答案
A _______ acts as a security buffer between a corporation's private network and all external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
Which of the following is the most widely used wireless network encryption for home wireless networks?
A. WEP
B. WPE
C. WPA
D. WPA2
Which of the following is not a measure to protect computer security?
A. Restricting access
B. Encrypting data
Copying data and storing it at a remote location
D. Keeping the same password on all systems consistently
_______ is concerned with protecting software and data from unauthorized tampering or damage.
A. Data backup
B. Physical security
C. Disaster recovery plan
Data security