Which of the following is used to ensure information integrity?

A) Auditing
B) Digital signatures
C) Backups
D) Passwords


B) Digital signatures

Computer Science & Information Technology

You might also like to view...

The purpose of the DHCP protocol is:

a. Assign IP address and subnet mask to a station b. Assign default gateway address to a station c. All of these d. Assign DNS and WINS server addresses to a station

Computer Science & Information Technology

Creating a "template world" as a starting scene can be an effective way to reuse transitions in a story.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you paste Excel data into a Word document, the data:

A) are pasted into table cells. B) retain Excel spreadsheet capabilities. C) convert to symbols. D) retain Excel spreadsheet formatting.

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which network type connects each computer and device to a central device?

A. a bus network B. a ring network C. a star network D. a core network

Computer Science & Information Technology