1.

If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Answer» C. nonrepudiation


Discussion

No Comment Found