Use app×
Join Bloom Tuition
One on One Online Tuition
JEE MAIN 2025 Foundation Course
NEET 2025 Foundation Course
CLASS 12 FOUNDATION COURSE
CLASS 10 FOUNDATION COURSE
CLASS 9 FOUNDATION COURSE
CLASS 8 FOUNDATION COURSE
0 votes
91 views
in General by (120k points)
closed by
____ is used to identify the creator of information.

(a) Integrity authentication

(b) Source authentication

(c) Integrity authorization

(d) Source authorization

1 Answer

0 votes
by (120k points)
selected by
 
Best answer
The correct answer is (b) Source authentication

For explanation: Integrity authentication verifies the reliability of data. Source authentication is used to identify the creator of information. Digital signature and key agreement techniques are examples of authentication services.

Welcome to Sarthaks eConnect: A unique platform where students can interact with teachers/experts/students to get solutions to their queries. Students (upto class 10+2) preparing for All Government Exams, CBSE Board Exam, ICSE Board Exam, State Board Exam, JEE (Mains+Advance) and NEET can ask questions from any subject and get quick answers by subject teachers/ experts/mentors/students.

Categories

...