Which of the following algorithms would be used to provide non-repudiation of a file transmission?
A . AES
B . RSA
C . MD5
D . SHA
Answer: C
Which of the following algorithms would be used to provide non-repudiation of a file transmission?
A . AES
B . RSA
C . MD5
D . SHA
Answer: C