GIAC GSEC Question Answer
What cryptographic technique does file Integrity monitoring employ?
Public-key cryptography
One-way hashes
Elliptical curve algorithms
Shared key cryptography
TESTED 14 Apr 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved