Which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Question:

Which scenario is a hash-only function most appropriate?

Options:

securing data at rest

securing wireless transmissions

securing data in files

securing real-time traffic

Correct Answer

The Correct Answer for this Question is

securing data at rest

Leave a Comment