The digital signature standard is a __________ standard that uses the secure hash algorithm.

A. IEEE
B. NIST
C. ISO
D. ITIL


B. NIST

Computer Science & Information Technology

You might also like to view...

Which of the following statements best describes the flow of control in the main method of a Java program that has no conditionals or loops?

a) Program statements are all executed at the same time. b) Program statements are executed according to their priority, which is specified by the programmer. c) Program statements are executed linearly, with earlier statements being executed first. d) Program statements are executed linearly, with later statements being executed first. e) Some program statements are executed at the same time, and others are executed in a linear manner.

Computer Science & Information Technology

You can print a text-only version of your presentation by selecting Outline in the __________ section.

A. Text-only      B. Handouts C. Options D. Settings

Computer Science & Information Technology

Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

A. Authenticity B. Nonrepudiation C. Confidentiality D. Integrity

Computer Science & Information Technology

____________________ contain marketing and demographic data about people, such as where they live and what products they buy.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology