Course Hero Logo

05.01 Data Protection.pdf - Concealing data by changing it...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 out of 1 page.

Concealing data by changing it into an unreadable form is called (5 points)
Which of the following creates a security concern by using AutoRun to automatically launchmalware?
What is the name of a current tool that can be used to encrypt a Windows partition?
Which of the following isnota way to minimize the risk of malware from flash drives?
What is data known as once it has been decrypted?
Using well-developed sentences, explain how and why decryption is used. ( 5 points)The process of decryption is known as the process of using keys or ciphers to decode ciphertext. In
End of preview. Want to read the entire page?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Ms. Holland
Tags
Cryptography, Encryption, VeraCrypt

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture