James recently received a secret message from Martha containing an order for custom services. He would like to be able to prove that Martha sent the message and that is could not be forged. What cryptographic goal is James attempting to achieve?
a. Confidentiality
b. Nonrepudiation
c. Security though obscurity
d. Integrity
e. Authentication
Answer: b. Nonrepudiation
Computer Science & Information Technology
You might also like to view...
When writing an event-handling method in a GUI application, what should you consider about a variable's scope?
What will be an ideal response?
Computer Science & Information Technology
_____________ is composed of the unused space in a cluster between the end of an active file's content and the end of the cluster.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology