This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.
A. authentication
B. hash
C. encryption
D. nonrepudiation
Answer: B
You might also like to view...
Describe howthe two-phase commit protocol can be expanded to deal with a cohort site that uses a timestamp-ordered concurrency control.
What will be an ideal response?
Pages that contain cells that will not be printed are shown in _____.
A. white B. light blue C. yellow D. gray
Which of the following statements about packet filter firewalls is not true?
A. They can filter traffic based on the port number. B. They can filter traffic based on the protocol type. C. They can filter traffic based on the state of the connection. D. They can filter traffic based on the source and destination address.
If you want to customize the form (or outline) of any shape in the shapes gallery, you can modify its ____ points.
A. form B. edit C. clip D. art