nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #704

CERTIFIED-IN-CYBERSECURITY Question #704: Real Exam Question with Answer & Explanation

The correct answer is B: Digital signatures. Digital signatures. Digital signatures use asymmetric encryption to provide non-repudiation, ensuring the integrity and authenticity of a message or document and verifying the identity of the

Security Principles

Question

Which cryptographic mechanism is commonly used to achieve non-repudiation?

Options

  • AAsymmetric encryption
  • BDigital signatures
  • CSymmetric encryption
  • DHash functions

Explanation

Digital signatures. Digital signatures use asymmetric encryption to provide non-repudiation, ensuring the integrity and authenticity of a message or document and verifying the identity of the

Topics

#Cryptography#Non-repudiation#Digital signatures#Security services

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions