CCNA CyberOps SECFND Objective 3.0

3.1 Describe the uses of a hash algorithm Hash algorithms are a one way function that produces a unique mapping from a piece of a data to a string. This string can then be used to verify that the data has not been altered. Security software also uses hashes to compare a file to a […]