X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
What will be an ideal response?
Question 2
The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
What will be an ideal response?