Which of the following is created using a hash algorithm and can be used to verify the authenticity of a document?

A. Digital signature
B. Ciphertext
C. Certificate authority
D. Public Key Infrastructure


Answer: A

Computer Science & Information Technology

You might also like to view...

What particular configuration determines if a computer is designated as a server?

What will be an ideal response?

Computer Science & Information Technology

In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You are creating a presentation about the solar system. What can be used to depict the orbit of the moon around Earth?

What will be an ideal response?

Computer Science & Information Technology

A server technician needs to connect two servers with gigabit NICs without MDI-X in order to transfer files between them and is unable to locate a switch with gigabit ports. Which of the following types of cables would allow the technician to connect the servers to obtain the FASTEST transfer rate possible?

A. Rollover cables B. CAT6 crossover cables C. CAT6 straight-through cables D. CAT5 straight-through cables

Computer Science & Information Technology