Card 57 / 125: Two end points are exchanging messages, the recipient detects a tampering in the message after it has been sent and refuses to accept the message. Which security aspect is applied in this case?
A)
Non-repudiation
B)
Data integrity
C)
Data Privacy
D)
Authentication
Answer:
B) Data integrity
Previous Card | ← Previous Card Button |
Next Card | → Next Card Button |
Flip Card | Space-Bar |