An information system owner has supplied a new requirement to the development team that calls for
increased non-repudiation within the application. After undergoing several audits, the owner determined
that current levels of non-repudiation were insufficient. Which of the following capabilities would be
MOST appropriate to consider implementing is response to the new requirement?

A.
Transitive trust
B.
Symmetric encryption
C.
Two-factor authentication
D.
Digital signatures
E.
One-time passwords