Multiple Choice
Ian is beginning his studies toward a degree in computer security. He knows that he has a lot to learn and wants as solid a footing in the basics as he can get. He has asked you to come over and help him make sure he's got a good grasp of the fundamentals.
-Next, you ask Ian what category of threat encryption is meant to tackle, and which encryption method works best on the Internet. He replies: ____ and ____.
A) necessity; symmetrical
B) integrity; asymmetrical.
C) secrecy; symmetrical,
D) necessity; symmetrical.,
Correct Answer:

Verified
Correct Answer:
Verified
Q130: The countermeasure that protects individuals from becoming
Q131: Virtual ports use numbers to isolate traffic
Q132: In the text, the term "applet" is
Q133: A(n) _ threat permits unauthorized data disclosure.<br>A)
Q134: Computer security is the use of _
Q136: A login generally consists of a user
Q137: The Ad-Aware ad blocker was created by
Q138: Email programs alert users when a link
Q139: A Web <u>phish</u> is a small, hidden
Q140: A(n) <u>certificate authority</u> authenticates the certificate holder's