1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
4 years ago
9

__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.

Computers and Technology
1 answer:
vitfil [10]4 years ago
5 0

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
You might be interested in
A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
kipiarov [429]

Answer:

c) false positive

Explanation:

An event signaling to produce an alarm when no attack has taken place. False positives are mislabeled security alerts, indicating there is a threat when in actuality, there isn’t. By default, most security teams are conditioned to ignore false positives, In the event of a false positive an IPS will actively stop the normal activity which is likely to negatively impact business functions.

8 0
3 years ago
Read 2 more answers
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there
klasskru [66]

Answer:

The right answer is GPS.

Explanation:

According to the scenario, the most appropriate answer is GPS service because nowadays there are many application i.e google maps,etc. which uses the location service and on the basis of the user's GPS coordinates gives the appropriate results.

GPS stands for the term global positioning system which is used to determine the geolocation of any person on earth by using navigation satellites.

4 0
4 years ago
Question #4
Nataliya [291]
A is your answer.............
3 0
3 years ago
A _______ is a host that runs software to provide information, such as web content, to other hosts.
kolezko [41]

Answer:

The correct answer to the following question will be "Server".

Explanation:

  • Any device with a network connection is a host, but only hosts which accept other device connections (climates) are Servers.
  • All servers were hosts, but the servers aren't all hosts.
  • Each host network is a node, however not all network nodes are a host. Networking hardware such as modems, hubs, and network switches are not necessarily network addresses allocated (except for administrative purposes sometimes).
8 0
4 years ago
you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
kipiarov [429]
Brainstorming, Rationalizing, and Rough Drafts.
8 0
3 years ago
Other questions:
  • Richard Palm is the accounting clerk of Olive Limited. He uses the source documents such as purchase orders, sales invoices and
    12·1 answer
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race:
    7·1 answer
  • The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
    11·1 answer
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    14·1 answer
  • PLEASE HELP FAST
    5·1 answer
  • In which of the following scenarios would you choose to embed versus import data?
    8·1 answer
  • The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False
    14·1 answer
  • Ok who tryna play zombs royale
    7·1 answer
  • PLEASE HELP!
    12·1 answer
  • What type of email communication reaches out to former clients and older prospects and encourages a reply? Strategic email Onboa
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!