+1 vote
in Ethical Hacking by
Hash functions can be leveraged to ensure ________.

Confidentiality

Integrity--

Availability

Authentication

1 Answer

0 votes
by
Integrity

Related questions

0 votes
asked Sep 16, 2019 in Blockchain Potentes nexus by john ganales
0 votes
asked Feb 1, 2022 in Amazon Database by sharadyadav1986
...