GIAC GSEC Question Answer
What cryptographic technique does file Integrity monitoring employ?
Public-key cryptography
One-way hashes
Elliptical curve algorithms
Shared key cryptography
TESTED 20 Dec 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved