Which of the following security practices would allow for non-repudiation and prevent network sniffers from reading the confidential mail?

An employee of a company files a complaint with a security administrator. While sniffing network
traffic, the employee discovers that financially confidential emails were passing between two
warehouse users. The two users deny sending confidential emails to each other. Which of the
following security practices would allow for non-repudiation and prevent network sniffers from
reading the confidential mail? (Select TWO).

An employee of a company files a complaint with a security administrator. While sniffing network
traffic, the employee discovers that financially confidential emails were passing between two
warehouse users. The two users deny sending confidential emails to each other. Which of the
following security practices would allow for non-repudiation and prevent network sniffers from
reading the confidential mail? (Select TWO).

A.
Transport encryption

B.
Authentication hashing

C.
Digital signature

D.
Legal mail hold

E.
TSIG code signing



Leave a Reply 0

Your email address will not be published. Required fields are marked *