Posted by: Pdfprep
Post Date: November 19, 2020
In which context is it inappropriate to use a hash algorithm?
A . SSH logins
B . verifying file integrity
C . Telnet logins
D . digital signature verification
Answer: C
Leave a Reply