The security technique that prevents parties from denying actions they have taken is known as:

A)

Authentication
B)

Nonrepudiation
C)

Identification
D)

Indemnification
E)

None of the above

B

Business

You might also like to view...

The cash flow pattern depicted is associated with a capital investment and may be characterized as ________. (See Table 10.2)

A) an annuity and a conventional cash flow B) a mixed stream and a nonconventional cash flow C) an annuity and a nonconventional cash flow D) a mixed stream and a conventional cash flow

Business

An analogy to distinguish requirements discovery and requirements gathering would be "requirements gathering locates where we must "drill," while requirements discovery is the act of drilling down

Indicate whether the statement is true or false

Business