What security goal do the following common controls address: hashing, digital signatures, certificates, nonrepudiation tools?
A. confidentiality
B. integrity
C. availability
D. safety
Answer: B
Computer Science & Information Technology
You might also like to view...
All of the following types of files can be removed by the Disk Cleanup utility EXCEPT ________
A) files that have not been backed up B) temporary Internet files C) Recycle Bin files D) temporary Windows files
Computer Science & Information Technology
To display a format of 12/30/2018 in a date field regardless of how the data was entered, use the ________ format
A) Long Date B) Date/Time C) End Date D) Short Date
Computer Science & Information Technology