You work as a developer at ABC.com. The ABC.com network consists of a single domain named
ABC.com.
You have been tasked with creating a new ABC.com application. The new application must be
configured to convey information between a ABC.com workstation and server in big quantities.
You are planning to include the HMACSHA256 algorithm in the development.
Which of the following describes the reason for including the HMACSHA256 algorithm?
A.
It allows for the authenticity of the information to be guaranteed via a cryptographic hashing
algorithm.
B.
It allows for the generation of output that is computationally infeasible to predict with a
probability that is better than one half.
C.
It classifies a wrapper object to access the CSP version of the DES algorithm.
D.
It performs symmetric encryption and decryption using the CAPI implementation of the AES
algorithm.
Explanation:
option A
as :HMACSHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC).
Integrity rather than authenticity