There are four fundamental requirements for a successful, secure transaction: privacy, integrity, authentication and_______.

a) restricted environment.
b) security.
c) nonrepudiation.
d) none of the above.

c) nonrepudiation.

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ character is a special character that designates the end of a line in a CSV file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology