Which of the following is used to ensure information integrity?

A) Auditing
B) Digital signatures
C) Backups
D) Passwords

B) Digital signatures

Computer Science & Information Technology

You might also like to view...

On LinkedIn, content differs from company to company and is accessed via a series of ________ at the top of the page

A) join links B) banners C) buttons D) tabs

Computer Science & Information Technology

The ____ constraint is the default for tasks that are entered into a project with an assigned finish date.

A. Finish No Later Than B. As Soon As Possible C. As Late As Possible D. Start No Earlier Than

Computer Science & Information Technology