1.

Which of the following is used in information security to prove the identity of the sender?

A. Confidentiality
B. Integrity
C. Authentication
D. none of the above
Answer» D. none of the above


Discussion

No Comment Found