Multiple Choice
The protection of the information that might be derived from observation of traffic flows is _________ .
A) connectionless confidentiality
B) connection confidentiality
C) traffic- flow confidentiality
D) selective- field confidentiality
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: A _ takes place when one entity
Q32: A loss of _ is the disruption
Q34: _ threats exploit service flaws in computers
Q35: Irreversible _ mechanisms include hash algorithms and
Q36: _ prevents either sender or receiver from
Q40: All the techniques for providing security have
Q41: Information access threats intercept or modify data
Q42: An)_ is a potential for violation of
Q43: Verifying that users are who they say
Q43: Two specific authentication services defined in X.800