784 views
1 vote
Which challenge comes under securing the information?

A.Signaling
B.Security
C.Presence detection
D.Power consumption

User Galaxy IT
by
7.9k points

1 Answer

6 votes

Final answer:

The challenge related to securing the information is 'Security,' which involves measures to protect data from unauthorized access and interference.

Step-by-step explanation:

The challenge that comes under securing the information is B. Security. In the context of cellular communications, similar to how cell phone networks use various encoding methods for signals to reach their intended recipients, security measures in information technology are used to ensure that data is protected from unauthorized access and interference. This includes encryption, firewalls, and secure communication protocols that aim to safeguard the info against cyber threats.

Securing the information refers to implementing measures to protect data from unauthorized access, disclosure, alteration, or destruction. Among the given options, security is the challenge that comes under securing the information. It involves strategies and techniques such as encryption, authentication, and access controls to ensure the confidentiality, integrity, and availability of data.

User Brandon Horst
by
8.2k points