Which of the following statements regarding authentication in conducting e-business is incorrect?
A. It is a process that establishes the origin of information or determines the identity of a user, process, or device.
B. Successful authentication can prevent repudiation in electronic transactions.
C. One key is used for encryption and decryption purposes in the authentication process.
D. We need to use asymmetric-key encryption to authenticate the sender of a document or data set.
Answer: C
You might also like to view...
The process of collecting information and providing feedback to employees about their behavior, communication style, or skills is known as
A. requirements analysis. B. counseling. C. quality check. D. data mining. E. assessment.
Similar to the constraints in the FASB's qualitative characteristics, the joint IASB/FASB boards have identified which constraint
A) consistency B) benefits that justify the costs C) materiality D) objectivity
When contemporary leadership researchers analyze conversations between leaders and subordinates in a workplace, they are using which approach in their studies?
A. trait approach B. discursive approach C. do as the leader wishes approach D. authentic leader approach
A performance measure that encompasses a firm's long-run average activity is referred to as ____________________ capacity
Fill in the blank(s) with correct word