Digital signature provides not only data origin authentication but also data ____.

A. availability
B. entity confidentiality
C. integrity
D. confidentiality


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following defines the C-string containing “Hello”?

a. char stringVar[10] = “Hello”; b. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’}; c. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’, ‘\0’}; d. char stringVar[6] = “Hello”; e. char stringVar[] = “Hello”;

Computer Science & Information Technology

What are the functions that can be applied on the common data structures?

a. add, delete, update, search, and size b. sort and random c. add d. enqueue and dequeue

Computer Science & Information Technology

Erase All Content and Settings is the iOS equivalent to Wipe Data/Factory Reset on an Android device

Indicate whether the statement is true or false

Computer Science & Information Technology

In PGP, ____ trust is established when a user trusts his or her own key pair.

A. marginal B. complete C. explicit D. implicit

Computer Science & Information Technology