B is corrent. The requirement is to identify a method of reducing security exposure when transmitting proprietary data over communication lines. Cryptographic devices protect data in transmission over communication lines. A is incorrect because firewalls protect a company’s data from penetration from external parties. C is incorrect because authentication techniques confirm that valid users have access to the system. D is incorrect because call-back procedures are used to ensure incoming calls are from authorized locations.
|