Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Posted by: Pdfprep Category: 210-260 Tags: , ,

Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A . securing wireless transmissions.
B . securing data in files.
C . securing real-time traffic
D . securing data at rest

Answer: A

Leave a Reply

Your email address will not be published.