What security goal do the following common controls address: hashing, digital signatures, certificates, nonrepudiation tools?

A. confidentiality
B. integrity
C. availability
D. safety

Answer: B

Computer Science & Information Technology

You might also like to view...

All of the following types of files can be removed by the Disk Cleanup utility EXCEPT ________

A) files that have not been backed up B) temporary Internet files C) Recycle Bin files D) temporary Windows files

Computer Science & Information Technology

To display a format of 12/30/2018 in a date field regardless of how the data was entered, use the ________ format

A) Long Date B) Date/Time C) End Date D) Short Date

Computer Science & Information Technology