A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be
implemented to enable such control.

A.
Digital signatures
B.
Mandatory access control
C.
Session keys
D.
Non-repudiation
Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent by the signer.
0
0