Which two statements correctly describe digital signatures? (Choose two.)
A.
They verify the identity of the sender.
B.
They use public and private key pairs.
C.
They hash the source and destination IP addresses of each packet.
D.
They hash only the source IP address of each packet.
A.
They verify the identity of the sender.
B.
They use public and private key pairs.