An information system owner has supplied a new requirement to the development team that calls for increased
non-repudiation within the application. After undergoing several audits, the owner determined that current levels
of non-repudiation were insufficient. Which of the following capabilities would be MOST appropriate to consider
implementing is response to the new requirement?
A.
 Transitive trust
B.
 Symmetric encryption
C.
 Two-factor authentication
D.
 Digital signatures
E.
 One-time passwords
http://searchsecurity.techtarget.com/definition/nonrepudiation