A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data
traffic?
A.
AES-128
B.
RSA Certificates
C.
SHA2-HMAC
D.
3DES
E.
Diffie-Helman Key Generation