When sensitive information travels over enterprise networks and the Internet can be protected by ___________________
Options
- Encryption algorithms
- Discription
- Decryption algorithms
- None
CORRECT ANSWER : Encryption algorithms
Write your comments