An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?

An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?

An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?

A.
Digitalized signatures

B.
Hashing

C.
Parsing

D.
Steganography

Explanation:
Steganography is a technique for concealing the existence of messages or information. An increasingly important steganographical technique is digital watermarking, which hides data with
data, e.g., by encoding rights information in a picture or music file without altering the picture or music’s perceivable aesthetic qualities. Digitalized signatures are not related to digital rights management. Hashing creates a message hash or digest, which is used to ensure the integrity of the message; it is usually considered a part of cryptography. Parsing is the process of splitting up a continuous stream of characters for analytical purposes, and is widely applied in the design of programming languages or in data entry editing.



Leave a Reply 0

Your email address will not be published. Required fields are marked *