Question
a.
Reduce its size
b.
Secure it for transmission
c.
Prepare it for backup
d.
Include it in the start-up sequence
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The main reason to encrypt a file is to ______________.
Similar Questions
Discover Related MCQs
Q. A public key encryption system
View solution
Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
View solution
Q. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
View solution
Q. Which of the following are forms of malicious attack ?
View solution
Q. What are common security threats ?
View solution
Q. From the following, which is not a common file permission ?
View solution
Q. Which of the following is a good practice ?
View solution
Q. What is not a good practice for user administration ?
View solution
Q. Which of the following is least secure method of authentication ?
View solution
Q. Which of the following is a strong password ?
View solution
Q. Why is one time password safe ?
View solution
Q. What does Light Directory Access Protocol (LDAP) doesn’t store ?
View solution
Q. What is characteristic of RADIUS system ?
View solution
Q. Which happens first authorization or authentication ?
View solution
Q. What is characteristics of Authorization ?
View solution
Q. What forces the user to change password at first logon ?
View solution
Q. What is not a best practice for password policy ?
View solution
Q. What is breach of integrity ?
View solution
Q. What is breach of confidentiality ?
View solution
Q. What is theft of service ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!