(ISC)2(ISC)2
CERTIFIED-IN-CYBERSECURITY · Question #704
CERTIFIED-IN-CYBERSECURITY Question #704: Real Exam Question with Answer & Explanation
The correct answer is B: Digital signatures. Digital signatures. Digital signatures use asymmetric encryption to provide non-repudiation, ensuring the integrity and authenticity of a message or document and verifying the identity of the
Security Principles
Question
Which cryptographic mechanism is commonly used to achieve non-repudiation?
Options
- AAsymmetric encryption
- BDigital signatures
- CSymmetric encryption
- DHash functions
Explanation
Digital signatures. Digital signatures use asymmetric encryption to provide non-repudiation, ensuring the integrity and authenticity of a message or document and verifying the identity of the
Topics
#Cryptography#Non-repudiation#Digital signatures#Security services
Community Discussion
No community discussion yet for this question.