Which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing wireless transmissions.
B. securing data in files.
C. securing real-time traffic
D. securing data at rest

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.