✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A user downloads a software update. The update is signed with the developer’s private key, and the user’s system verifies the signature using the developer’s public key. After installation, the software behaves as expected.
Which security goals are demonstrated?