Implementing Cisco Network Security (IINS v3.0) (#173)

Referencing the CIA model, in which scenario is a hash-only function most appropriate?

securing data at rest
securing wireless transmissions
securing data in files
securing real-time traffic