CompTIA Security+ SY0-701 Practice Question
A company is about to deploy a system for securely exchanging contracts with its vendors. They want to ensure that a vendor cannot successfully claim they did not sign a contract when they actually did. Which of the following should the company implement to guarantee this requirement?
Enforce a strict multi-factor authentication method for system access.
Generate and compare hash values for each contract before and after signing.
Add a salting mechanism to their password storage system.
Implement digital signatures for all electronic contracts to provide proof of origin.