Study the snort rule given below: From the options below, choose the exploit against which this rule applies.
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?