Which of the following provides the BEST mechanism to achieve this goal?

A systems administrator needs to configure an email client to ensure data integrity of the email messages.
Which of the following provides the BEST mechanism to achieve this goal?
A. Cyclic redundancy check
B. SHA-1 hashes
C. SHA-256 hashes
D. Digital signature

comptia-exams

One thought on “Which of the following provides the BEST mechanism to achieve this goal?

  1. SHA-256 is used in some of the most popular authentication and encryption protocols, including SSL, TLS, IPsec, SSH, and PGP.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.