GIAC GSEC Question Answer
What cryptographic technique does file Integrity monitoring employ?
Public-key cryptography
One-way hashes
Elliptical curve algorithms
Shared key cryptography
TESTED 25 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved