A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?
SHA-256 is the best method to ensure that downloaded images are not modified in transit. SHA-256 is a type of cryptographic hash function that can generate a unique and fixed-length digest for any input data. The digest can be used to verify the integrity and authenticity of the data, as any modification or tampering of the data would result in a different digest.SHA-256 is more secure and reliable than MD5, which is an older and weaker hash function that has been proven to be vulnerable to collisions and attacks12. AES-256 and serpent-256 are types of encryption algorithms, not hash functions, and they are used to protect the confidentiality of the data, not the integrity.IPSec is a network security protocol that can use encryption and hashing to secure data in transit, but it is not a method by itself
Lilli
2 days agoDusti
7 days agoGwenn
2 days agoStephen
9 days agoElenor
18 days ago