Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following ensure the authenticity of personal involved in the manipulation of information & later cannot deny the involvement?
Home
Salesforce
Which of the following ensure the authenticity of personal involved in the manipulation of...
0
votes
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
Which of the following ensure the authenticity of personal involved in the manipulation of information & later cannot deny the involvement?
1. integrity
2. Confidentially
3. Authentication
4. Non-Repudiation
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
Answer is
Non-Repudiation
Related questions
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Operational Threat Models in VAST covers following
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
0
votes
Q: DES & 3DES are?
asked
Mar 17, 2021
in
SAP
by
DavidAnderson
ssa
0
votes
Q: Both Digital Signature & Message Authentication code (MAC) provides authentication.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
digital-signature
message-authentication-code
mac
ssa
0
votes
Q: Both Digital Signature & Message Authentication Code(MAC) Provides Non Repudiation
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: Cyclomatic complexity increase by
asked
Mar 17, 2021
in
Salesforce
by
DavidAnderson
ssa
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
software-integrity
software-security
ssa
...