How is non-repudiation often implemented?
A. Hash calculations
B. Baselining of security configurations
C. Digital signatures
D. M-of-N control
Answer: C. Digital signatures
Computer Science & Information Technology
You might also like to view...
Most computers include a(n) optical drive that uses a small laser light to read data stored on CDs, DVDs, or Blu-ray disks.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is consistency?
What will be an ideal response?
Computer Science & Information Technology