Which of the following methods will you use to accomplish the task?

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a
hashing method in the organization that can resist forgery and is not open to the man-in-themiddle attack. Which of the following methods will you use to accomplish the task?

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a
hashing method in the organization that can resist forgery and is not open to the man-in-themiddle attack. Which of the following methods will you use to accomplish the task?

A.
MD

B.
NTLM

C.
MAC

D.
SHA



Leave a Reply 0

Your email address will not be published. Required fields are marked *