Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.

A.
Authenticity
B.
Receipt
C.
Authorization
D.
Confidentiality
Explanation:
When using a private key to encrypt data (message digest) this proves
that the message came from the owner of the private key, which is authenticity.