Which scenario is a hash-only function most appropriate?
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing wireless transmissions.
B. securing data in files.
C. securing real-time traffic
D. securing data at rest
Correct Answer: D