Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity


B. You should use nonrepudiation to prevent Tom from denying that he sent the e-mails.

Computer Science & Information Technology

You might also like to view...

Read the first integer from the user and store it in the variable x.

What will be an ideal response?

Computer Science & Information Technology

The intersection of each row and column in the OpenOffice Calc application is an individual ________

A) deck B) block C) point D) cell

Computer Science & Information Technology

When using ____ layout, you do not have to guess about the width of the users' viewports.

A. fluid B. fixed C. standard D. template

Computer Science & Information Technology

Which of the following class has public constructors?

A. Stream B. TextReader C. File D. StreamReader

Computer Science & Information Technology