Alice wants to send Bob a message with the confidence that Bob will know the message was not altered while in transit. What goal of cryptography is Alice trying to achieve?

A. Confidentiality
B. Nonrepudiation
C. Authentication
D. Integrity


Answer: D. Integrity

Computer Science & Information Technology

You might also like to view...

The formatting options for Web pages and an Access report are the same

Indicate whether the statement is true or false

Computer Science & Information Technology

The responsibilities of users and systems administrators with regard to systems administration duties should be specified in the ____________________ section of the ISSP.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Create a PL/SQL block that declares a cursor. Pass a parameter to the cursor of the type that is the same as the Salary column in EMPLOYEE table to the cursor. Open the cursor with a value for the parameter. Retrieve information into the cursor for a salary higher than the parameter value. Use a loop to print each employee’s information from the cursor (cursor with parameter problem).

What will be an ideal response?

Computer Science & Information Technology

A signature-based IDPS examines network traffic in search of patterns that match known ____.

A. keys B. addresses C. signatures D. phrases

Computer Science & Information Technology