Digital signature provides not only data origin authentication but also data ____.
A. availability
B. entity confidentiality
C. integrity
D. confidentiality
Answer: C
You might also like to view...
Which of the following defines the C-string containing “Hello”?
a. char stringVar[10] = “Hello”; b. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’}; c. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’, ‘\0’}; d. char stringVar[6] = “Hello”; e. char stringVar[] = “Hello”;
What are the functions that can be applied on the common data structures?
a. add, delete, update, search, and size b. sort and random c. add d. enqueue and dequeue
Erase All Content and Settings is the iOS equivalent to Wipe Data/Factory Reset on an Android device
Indicate whether the statement is true or false
In PGP, ____ trust is established when a user trusts his or her own key pair.
A. marginal B. complete C. explicit D. implicit