Which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing data at rest
B. securing wireless transmissions
C. securing data in files
D. securing real-time traffic

cisco-exams

3 thoughts on “Which scenario is a hash-only function most appropriate?

  1. hashing provides data integrity in transit. securing data at rest is accomplished via encryption.
    the most likely answer would be B or even D

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.