________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A. Identification
B. Message authentication
C. Verification
D. User authentication


B. Message authentication

Computer Science & Information Technology

You might also like to view...

According to a 2007 survey, what percentage of organizations in the US monitored the time spent, content, or keystrokes of workers?

A) 33% B) 40% C) 60% D) 45%

Computer Science & Information Technology

The ________ attribute specifies that a new e-mail message should be sent when a link is clicked

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the accompanying figure, new, unread items ____.

A. appear at the bottom B. are displayed, but not read items C. appear in bold D. are displayed with an unread mark

Computer Science & Information Technology

What type of structure is usually used to organize folders in a file system?

A. flat B. hierarchical C. pyramid D. relational

Computer Science & Information Technology