Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
A. Entropy
B. Principle of least privilege
C. Non-repudiation
D. Code signing
Answer: C. Non-repudiation
Computer Science & Information Technology
You might also like to view...
Financial institutions make money on loans by charging a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A temporary profile is a roaming profile that can't be changed by the user
Indicate whether the statement is true or false
Computer Science & Information Technology
What is a data type? List the data types commonly found in a database.
What will be an ideal response?
Computer Science & Information Technology
Provide three examples each of closed-ended, open-ended, and range-of-response questions.
What will be an ideal response?
Computer Science & Information Technology