The public relations department at your company regularly sends out emails signed by the company's CEO with announcements about the company. The CEO sends company and personal emails from a different email account. A competitor is suing your company for copyright infringement. As part of the investigation, you must provide legal counsel with a copy of all emails that came from the CEO, including

those generated by the public relations department. The email server allows emails to be digitally signed, and the corporate PKI provisioning allows for one certificate per user. The CEO did not share their password with anyone. You need to provide legal counsel with information on how to determine if a particular email came from the public relations department or from the CEO. What should you do?

A. Implement Digital Rights Management (DRM).
B. Use non-repudiation.
C. Implement encryption.
D. Employ key escrow.


B
Explanation: You should use non-repudiation. Non-repudiation is provided when an email includes a digital signature.
Digital rights management (DRM) allows an organization to control and track who has access to data. Encryption protects data. Key escrow ensures that encryption keys can be retrieved from a third party.

Computer Science & Information Technology

You might also like to view...

What is unique about the Windows 10 operating system?

A) It will be continually updated from now on. B) It is a short-term operating system until Windows 11 is released. C) It is less efficient with touch-screen computers. D) It requires a considerably more powerful computer than Windows 8.

Computer Science & Information Technology

To export ________ from one database to another, you must copy and paste the records

A) tables B) objects C) table relationships D) selected records

Computer Science & Information Technology

An ATM is a self-service banking terminal that connects to a host computer through a network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the name of the threat actor's computer that gives instructions to an infected computer?

A. Command and control (C&C) server B. Resource server C. Regulating Net Server (RNS) D. Monitoring and Infecting (M&I) server

Computer Science & Information Technology