The roots of modern encryption can be traced back almost _____ years.
A/An _____ can happen if you're not careful when using public Wi-Fi.
Which of the following distributions is no longer available?
Information security must _____, and protect against all threats.