Which term describes the security measure employed by the second system in this transaction?

Two computer systems interact. Later, the first system has no proof that any transaction took
place. The second system provides proof of the transaction. Which term describes the security
measure employed by the second system in this transaction?

Two computer systems interact. Later, the first system has no proof that any transaction took
place. The second system provides proof of the transaction. Which term describes the security
measure employed by the second system in this transaction?

A.
Data integrity

B.
Nonrepudiation

C.
Access control

D.
Authentication



Leave a Reply 0

Your email address will not be published. Required fields are marked *