_____________is an application that is used for protection against malicious software.
Antivirus software
Malicious software
Programming software
None of these
Which of the following backup methods copies files or folders without any compression?
Full
Differential
Incremental
Mirror
___________ is the art and science of breaking cipher text.
Cryptanalysis
Cryptography
Cryptology
Which of the following is security provisions in e - commerce must ensure?
Access control
Authentication
Confidentiality
All of these
A _____ is used to verify the authenticity of an electronic document.
Digital signature
Firewall
Encryption