Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
Hello! I believe the answer for this is "True"!
Answer:
An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.
Explanation:
What did you do when you got to school tomorrow and then again I don't want it