Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A . securing wireless transmissions.
B . securing data in files.
C . securing real-time traffic
D . securing data at rest

Answer: D

Latest 210-260 Dumps Valid Version with 498 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments