Which of the following is used to ensure information integrity?
A) Auditing
B) Digital signatures
C) Backups
D) Passwords
B) Digital signatures
Computer Science & Information Technology
You might also like to view...
On LinkedIn, content differs from company to company and is accessed via a series of ________ at the top of the page
A) join links B) banners C) buttons D) tabs
Computer Science & Information Technology
The ____ constraint is the default for tasks that are entered into a project with an assigned finish date.
A. Finish No Later Than B. As Soon As Possible C. As Late As Possible D. Start No Earlier Than
Computer Science & Information Technology