0 votes
in Ethical Hacking by

Hash functions can be leveraged to ensure ________.

(1)Availability

(2)Confidentiality

(3)Authentication

(4)Integrity

1 Answer

0 votes
by
Integrity

Related questions

0 votes
asked Mar 17, 2021 in Secure Code Review by DavidAnderson
0 votes
asked Feb 12, 2020 in JAVA by rahuljain1
...