Which of the following methods will you use to accomplish the task?

You
work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing
method in the organization that can resist forgery and is not open to the man-in-the-middle attack.
Which of the following methods will you use to accomplish the task?

You
work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing
method in the organization that can resist forgery and is not open to the man-in-the-middle attack.
Which of the following methods will you use to accomplish the task?

A.
MD

B.
NTLM

C.
MAC

D.
SHA

Explanation:
In order to accomplish the task, you will use the Message Authentication Code (MAC).
The Message Authentication Code can resist forgery
and is not open to the man-in-the-middle attacks. It is similar to a hash function.



Leave a Reply 0

Your email address will not be published. Required fields are marked *