Applying a digital signature to data traveling in a network provides:

A.
confidentiality and integrity.
B.
security andnonrepudiation.
C.
integrity andnonrepudiation.
D.
confidentiality andnonrepudiation.
Explanation:
The process of applying a mathematical algorithm to the data that travel in the network and placing
the results of this operation with the hash data is used for controlling data integrity, since any
unauthorized modification to this data would result in a different hash. The application of a digital
signature would accomplish the non repudiation of the delivery of the message. The term security is
a broad concept and not a specific one. In addition to a hash and a digital signature, confidentiality is
applied when an encryption process exists.