When IBM needed a better way to meet their global IT training needs, they turned to TestOut to efficiently teach IBM employees worldwide on PC and IT networking skills.
TestOut provides the IT industry's best company training tools.
4. Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.
In this example, what protection does the hashing activity provide?