1.

………………. Is used to keep transmissions privacy through the use ofdata encryption techniques.

A. data encryption
B. crytography
C. security key
D. non e
Answer» C. security key


Discussion

No Comment Found