Posted by: Pdfprep
Post Date: November 9, 2020
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A . securing wireless transmissions.
B . securing data in files.
C . securing real-time traffic
D . securing data at rest
Answer: A
Leave a Reply