Each of the following is an example of how hashing is used except __________.
a. bank automatic teller machine (ATM)
b. verifying a user password entered on a Linux system
c. determining the integrity of a message
d. encrypting and decrypting e-mail attachments
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here