PdfPrep.com

In which context is it inappropriate to use a hash algorithm?

In which context is it inappropriate to use a hash algorithm?
A . SSH logins
B . verifying file integrity
C . Telnet logins
D . digital signature verification

Answer: C

Exit mobile version