Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?
A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity
B. You should use nonrepudiation to prevent Tom from denying that he sent the e-mails.
Computer Science & Information Technology
You might also like to view...
What Windows 8.1 utility will constantly make copies of your important files so that you can recover them if you ever encounter a problem?
A) File history B) File recovery C) Action center D) Control Panel
Computer Science & Information Technology
When the _________ keyword is left out, the database system automatically eliminates any duplicate rows.
a. DISTINCT b. ANY c. ALL d. EXCEPT
Computer Science & Information Technology