Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?
A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity
B. You should use nonrepudiation to prevent Tom from denying that he sent the e-mails.
Computer Science & Information Technology
You might also like to view...
Read the first integer from the user and store it in the variable x.
What will be an ideal response?
Computer Science & Information Technology
The intersection of each row and column in the OpenOffice Calc application is an individual ________
A) deck B) block C) point D) cell
Computer Science & Information Technology
When using ____ layout, you do not have to guess about the width of the users' viewports.
A. fluid B. fixed C. standard D. template
Computer Science & Information Technology
Which of the following class has public constructors?
A. Stream B. TextReader C. File D. StreamReader
Computer Science & Information Technology