SHA and MD5 are examples of which of the following?

  • HIPS
  • Tunneling protocols
  • Hashing algorithms
  • Encryption algorithms

CompTIA Security+ SY0-401
  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography
    • This question is filed here