An employee of your company files a complaint with a security administrator. While sniffing network traffic, the employee discovers that financially confidential emails were passing between two warehouse users. The two users deny sending confidential emails to each other. You need to allow for non-repudiation and prevent network sniffers from reading the confidential mail. What should you do?

A. Implement transport encryption and authentication hashing.
B. Implement transport encryption and legal mail hold.
C. Implement legal mail hold and authentication hashing.
D. Implement transport encryption and digital signatures.

D
Explanation: To allow for non-repudiation and prevent network sniffers from reading the confidential mail, you should implement transport encryption and digital signatures. Transport encryption protects all information transmitted over the network. Digital signatures ensure that the source of the email can be verified.
A legal mail hold would require more administrative effort than is necessary and would not provide non-repudiation. Authentication hashing would only ensure that authentication traffic is verified to be unchanged and therefore valid.

Computer Science & Information Technology

You might also like to view...

Outlook provides the option to use ________ which has preset colors, fonts, and effects

A) a theme B) SmartArt C) stationery D) WordArt

Computer Science & Information Technology

A catch block that does not specify an exception type or an identifier ____________.

a) is an error b) cannot catch any exceptions c) can catch any exceptions d) None of the above

Computer Science & Information Technology