You are the Network Administrator for a small business. You need a widely used, but highly secure
hashing algorithm. Which of the following should you choose?
A.
AES
B.
SHA
C.
EAP
D.
CRC32
Explanation:
Secure Hash Algorithm (SHA) is a well known, widely used, and highly secure hashing
algorithm designed by the National Security Agency.