Difficulty: Easy
Correct Answer: data communication
Explanation:
Introduction / Context:
Encryption converts readable data (plaintext) into an unreadable format (ciphertext) that can only be reversed by authorized parties. It is fundamental to confidentiality and integrity across networks and storage. This question asks where encryption is primarily applied in typical computing operations.
Given Data / Assumptions:
Concept / Approach:
The most widespread use of encryption is in data communication (e.g., TLS for web traffic, VPN tunnels, secure email), protecting data while it traverses untrusted networks. While encryption can also apply to stored files (at rest) and specific application fields, the archetypal, daily application is securing data in transit between clients, servers, and services.
Step-by-Step Solution:
Verification / Alternative check:
Industry standards (TLS everywhere) and regulatory guidance emphasize encrypting data in transit across public and internal networks.
Why Other Options Are Wrong:
File retention: Retention policies govern retention periods, not encryption per se.
Transaction entry: Focuses on validation and authentication rather than encryption itself.
Computer processing: Data is typically decrypted for processing; encryption is not the processing mechanism.
None: Incorrect since encryption clearly applies to communications.
Common Pitfalls:
Conflating encryption at rest with retention or backups; they serve different controls and objectives.
Final Answer:
data communication
Discussion & Comments