Statements A, B and D correctly describe how digital signatures work in secure ICT systems. They rely on cryptographic methods, maintain integrity and are commonly implemented through PKI frameworks. Statement C is false because merely scanning a handwritten signature does not provide cryptographic security or tamper detection. Hence, the correct combination is A, B and D only.
Option A:
Option A is incorrect because it lists only A and B as correct, omitting D. While A and B are true, statement D is also important in explaining typical infrastructure used for digital signatures. Leaving out D makes the answer technically incomplete.
Option B:
Option B is correct because it includes all three accurate statements about digital signatures. It excludes the superficial notion in C that an image scan can substitute for cryptographic signing. This reflects proper understanding of secure digital authentication.
Option C:
Option C is incorrect because it groups B and D only and omits A. Statement A is essential in defining digital signatures as cryptographic constructs. Without it, the conceptual explanation is weakened.
Option D:
Option D is incorrect because it includes A, C and D as correct statements. Accepting C would mean treating non-cryptographic image scans as equivalent to digital signatures, which is not correct.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!