1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
14

Which part(s) of CAIN is realized through the use of message digest functions and hashes?

Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
5 0

Answer:

Integrity

Explanation:

In CAIN, integrity is realized through the use of message digest functions and hashes.

Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.

The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.

You might be interested in
An idea concerning what will happen in the future. (Crossword)
dangina [55]

Answer:

<h2>Expectation </h2>

Explanation:

Expectation is  an idea concerning what will happen in the future

7 0
3 years ago
All of the following are examples of what rigorous coursework in high school might mean except: A) added reading assignments. B)
faust18 [17]

Answer:b

Explanation:

3 0
3 years ago
Read 2 more answers
The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
jarptica [38.1K]

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

4 0
2 years ago
What is this screen called? (I attached a picture)
Anna11 [10]

Answer:

graph screen is the correct answer

8 0
2 years ago
Read 2 more answers
Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
Oksanka [162]

D. I hope it helped
5 0
2 years ago
Other questions:
  • What in Microsoft word brings up mini toolbar
    7·1 answer
  • Why students might want headsets for their computers?
    11·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • Can i have information about skrillex hobbies
    6·1 answer
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • Discuss how printing, publishing, and e-learning industries have transformed on evolved due to developments and advances the fie
    14·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!