Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?

A. Entropy
B. Principle of least privilege
C. Non-repudiation
D. Code signing


Answer: C. Non-repudiation

Computer Science & Information Technology

You might also like to view...

Financial institutions make money on loans by charging a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A temporary profile is a roaming profile that can't be changed by the user

Indicate whether the statement is true or false

Computer Science & Information Technology

What is a data type? List the data types commonly found in a database.

What will be an ideal response?

Computer Science & Information Technology

Provide three examples each of closed-ended, open-ended, and range-of-response questions.

What will be an ideal response?

Computer Science & Information Technology