COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?
A
In a compressed only format.
B
In an encrypted format.
C
In an unsigned email.
D
As quickly as possible.
Explanation: 

Detailed explanation-1: -21. Question 21-Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation? In a compressed only format.

Detailed explanation-2: -Which one of the following describes how confidential information should be sent using an unsecured network? In an unsigned email.

Detailed explanation-3: -Your system administrator will lose access to your computer.

Detailed explanation-4: -Which one of the following describes why you should follow guidelinesand procedures while using IT resources in an organisation? A. To ensure easy access to information on your computer.

Detailed explanation-5: -Data security methods span on-premises and cloud environments and include encryption, masking, tokenization, erasure, authentication, access control, backups and recovery and data resilience.

There is 1 question to complete.