Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing data at rest
B. securing wireless transmissions
C. securing data in files
D. securing real-time traffic
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing data at rest
B. securing wireless transmissions
C. securing data in files
D. securing real-time traffic
When an interface is assigned to a zone, the hosts connected to that interface are included in that zone. By default, traffic is allowed to flow between interfaces that are members of the same zone, while a default “deny-all” policy is applied to traffic moving between zones.
Page 5
https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/fwzbf.pdf
hashing provides data integrity in transit. securing data at rest is accomplished via encryption.
the most likely answer would be B or even D
what about #enable secret ? It’s hashing!
store password in rest.