Multiple Choice
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.
A) Line
B) Transmission
C) Cryptographic
D) Emanations
E) Technical
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Computer security strategies in the form of
Q2: _ property is defined as information created
Q3: _ involves information risk assessment and intelligence
Q4: INFOSEC views operations from an adversary's perspective
Q5: Computer crime is generally defined as any
Q7: Communications _ security involves prevention of adverse
Q8: According to the United States _, critical
Q9: The _ involves collaboration among several organizations
Q10: What is the purpose of information security
Q11: _ includes all efforts to protect information