Which of the following is the ability to verify that the data received did in fact come from the named source?
A. Access control
B. Connectionless integrity
C. Data origin authentication
D. Confidentiality
Answer: C
You might also like to view...
A video file must be played with the same ____________________ used to create the video file.
Fill in the blank(s) with the appropriate word(s).
Which of the following masks can be used to flip bit 3?
A. 0x03 B. 0x04 C. 0xF3 D. 0xF4 E. 0xF7
class rectangleType{public:void setLengthWidth(double x, double y);//Postcondition: length = x; width = y;void print() const;//Output length and width;double area();//Calculate and return the area of the rectangle;double perimeter();//Calculate and return the parameter;rectangleType();//Postcondition: length = 0; width = 0;rectangleType(double x, double y);//Postcondition: length = x; width = y;private: double length; double width;}; Consider the accompanying class definition. Which of the following variable declarations is correct?
A. rectangle rectangleType; B. class rectangleType rectangle; C. rectangleType rectangle; D. rectangle rectangleType.area;
An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install?
A. A host- based firewall B. A network-based firewall C. A host-based stateful firewall D. A stateless network-based firewall.