1.

____ is used to identify the creator of information.(a) Integrity authentication(b) Source authentication(c) Integrity authorization(d) Source authorizationThe question was posed to me in homework.My question comes from Hardware Architecture topic in division Software Defined Radio Architecture of Cognitive Radio

Answer»

The correct answer is (B) Source authentication

For explanation: Integrity authentication verifies the reliability of DATA. Source authentication is USED to identify the creator of INFORMATION. Digital signature and key agreement techniques are examples of authentication services.



Discussion

No Comment Found

Related InterviewSolutions