Multiple Choice
Which of the following refers to the tactic of keeping security holes,encryption algorithms,and processes secret in an effort to confuse attackers?
A) Authorization control
B) Secure socket layer
C) Security through obscurity
D) Biometrics
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: What is the most important aspect of
Q16: Which of the following installs monitoring software
Q18: What is the primary electronic transaction and
Q19: Passwords,biometrics,and digital signatures are examples of which
Q20: The advantage of e-business transactions is:<br>A)the use
Q22: What is usually the primary goal in
Q24: Which of the following is NOT a
Q25: What is normally the primary concern in
Q26: Generally, the best way to prevent fraud
Q28: Which of the following is NOT a