Security+ ยท 3.0 Security Architecture
Hashing
A one-way function producing a fixed-size digest from input. Cryptographically secure hashes (SHA-256, BLAKE2) are collision-resistant. MD5 and SHA-1 are broken and should not be used for security.
How this shows up at NCAE
File integrity monitoring uses hashing. Password storage uses hashing (with salts). The `md5sum` command on your baseline files, rerun later, shows what red team changed.