Certified Information Security Manager (CISM) Practice Exam Flash Cards

Disable ads (and more) with a membership for a one time $2.99 payment

Question: 1 / 50

A hash function is often utilized for which of the following purposes?

?

Password-based authentication

Next

Report this question