Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery is a(n) ___________ .

A) security audit trail
B) digital signature
C) encipherment
D) authentication exchange

B) digital signature

Computer Science & Information Technology

You might also like to view...

What default reference bandwidth does OSPF use when calculating the metric?

A) 10 Mbps B) 1 Gbps C) 100 Mbps D) 100 Gbps

Computer Science & Information Technology

For a buffer overflow attack to be successful, the attacker needs to know the address and the size of the stack as well as make the return pointer point to the code for execution

Indicate whether the statement is true or false.

Computer Science & Information Technology