You
work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing
method in the organization that can resist forgery and is not open to the man-in-the-middle attack.
Which of the following methods will you use to accomplish the task?
A.
MD
B.
NTLM
C.
MAC
D.
SHA
Explanation:
In order to accomplish the task, you will use the Message Authentication Code (MAC).
The Message Authentication Code can resist forgery
and is not open to the man-in-the-middle attacks. It is similar to a hash function.