According to the article "Assuring the USAF Core Missions in the Information Age," Lt Gen Bender and Col Bryant in reference to Cyber operations, obtaining and maintaining ______________________ will prevent the enemy from effectively interfering with operations.
a) Advanced encryption techniques
b) Secure communication protocols
c) Information superiority
d) Redundant data backups