Which data security component is provided by hashing algorithms?
- key exchange
- confidentiality
- integrity
- authentication
Explanation: Hashing algorithms are used to provide message integrity, which ensures that data in transit has not changed or been altered.
Exam with this question: CCNA SECFND 210-250 Dumps – Certification Practice Exam Answers
Exam with this question: Module 16: Quiz – Basic Integrity and Authenticity Network Security
More Questions: CyberOps Associate (Version 1.0) - CyberOps Associate (200-201) Certification Practice Exam
Please login or Register to submit your answer