Which two statements best describe digital signatures? (Choose two.)
A.
They use public and private key pairs.
B.
They hash the source and destination IP addresses of each packet.
C.
They hash only the source IP address of each packet.
D.
They verify the identity of the sender.