The security technique that prevents parties from denying actions they have taken is known as:
A)
Authentication
B)
Nonrepudiation
C)
Identification
D)
Indemnification
E)
None of the above
B
Business
You might also like to view...
The cash flow pattern depicted is associated with a capital investment and may be characterized as ________. (See Table 10.2)
A) an annuity and a conventional cash flow B) a mixed stream and a nonconventional cash flow C) an annuity and a nonconventional cash flow D) a mixed stream and a conventional cash flow
Business
An analogy to distinguish requirements discovery and requirements gathering would be "requirements gathering locates where we must "drill," while requirements discovery is the act of drilling down
Indicate whether the statement is true or false
Business