How is non-repudiation often implemented?

A. Hash calculations
B. Baselining of security configurations
C. Digital signatures
D. M-of-N control

Answer: C. Digital signatures

Computer Science & Information Technology

You might also like to view...

Most computers include a(n) optical drive that uses a small laser light to read data stored on CDs, DVDs, or Blu-ray disks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is consistency?

What will be an ideal response?

Computer Science & Information Technology