In which context is it inappropriate to use a hash algorithm?

Posted by: Pdfprep Category: 210-250 Tags: , ,

In which context is it inappropriate to use a hash algorithm?
A . SSH logins
B . verifying file integrity
C . Telnet logins
D . digital signature verification

Answer: C

Leave a Reply

Your email address will not be published.