Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?
Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?
A . Authentication
B . Encryption
C . Firewall
D . Intrusion Detection System
Answer: B
Explanation:
Option 1: Incorrect. Authentication refers to the process of verifying the identity of a user or system.
Option 2: Correct. Encryption is a data protection technique that transforms data into a format that is unreadable to unauthorized users. It provides confidentiality and ensures that even if the data is intercepted, it cannot be easily understood.
Option 3: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Option 4: Incorrect. An Intrusion Detection System (IDS) is a security tool that monitors network traffic for suspicious activity or violations of security policies.
Latest 100-160 Dumps Valid Version with 309 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund