What technique creates different hashes for the same password?
- SHA-256
- HMAC
- CRC
- salting
Explanation: Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies used to ensure data integrity.
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full
Please login or Register to submit your answer