GIAC GSEC Question Answer
What cryptographic technique does file Integrity monitoring employ?
Public-key cryptography
One-way hashes
Elliptical curve algorithms
Shared key cryptography
TESTED 12 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved