Encryption and hashing are used to make certain that only authorized entities can read the message.
- Confidentiality
- Integrity
- Authentication
Explanation: Confidentiality can use encryption and hashing to make certain that only authorized entities can read the message.
Exam with this question: Network Security 1.0 - 15.1.5 Check Your Understanding: Identify the Secure Communication Objective
Please login or Register to submit your answer