A certain script was recently altered by the author to meet certain security requirements, and
needs to be executed on several critical servers. Which of the following describes the process of
ensuring that the script being used was not altered by anyone other than the author?
A.
Digital encryption
B.
Digital signing
C.
Password entropy
D.
Code signing