Computer-Networks
August 29, 2024Computer-Networks
August 29, 2024Computer-Networks
Question 359 |
Which of the following is a security requirement?
Confidentiality and Integrity | |
Authentication
| |
Non-repudiation
| |
All the above |
Question 359 Explanation:
Confidentiality-No other person can look into the information.Only for whom it is intended can look into it.
Integrity-No one can change the information.
Authentication-It guarantees the identity of the sender.
Non-repudiation-Nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.
Hence all are the security requirement.
Integrity-No one can change the information.
Authentication-It guarantees the identity of the sender.
Non-repudiation-Nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.
Hence all are the security requirement.
Correct Answer: D
Question 359 Explanation:
Confidentiality-No other person can look into the information.Only for whom it is intended can look into it.
Integrity-No one can change the information.
Authentication-It guarantees the identity of the sender.
Non-repudiation-Nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.
Hence all are the security requirement.
Integrity-No one can change the information.
Authentication-It guarantees the identity of the sender.
Non-repudiation-Nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.
Hence all are the security requirement.
Subscribe
Login
0 Comments