Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity

B. You should use nonrepudiation to prevent Tom from denying that he sent the e-mails.

Computer Science & Information Technology

You might also like to view...

What Windows 8.1 utility will constantly make copies of your important files so that you can recover them if you ever encounter a problem?

A) File history B) File recovery C) Action center D) Control Panel

Computer Science & Information Technology

When the _________ keyword is left out, the database system automatically eliminates any duplicate rows.

a. DISTINCT b. ANY c. ALL d. EXCEPT

Computer Science & Information Technology