You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?
- SHA-1
- AES
- MD5
- SHA-256
Explanation: MD5 and SHA are the two most popular hashing algorithms. SHA-256 uses a 256-bit hash, whereas MD5 produces a 128-bit hash value.
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full
Please login or Register to submit your answer