PdfPrep.com

Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A . securing wireless transmissions.
B . securing data in files.
C . securing real-time traffic
D . securing data at rest

Answer: A

Exit mobile version