#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Availability such as data encryption and hashing is applied using authentication protocols.

Answer

False