Which two steps does a receiver perform to validate a message using HMAC? (Choose two.)
A.
look up the sender’s public key.
B.
compares the computed MAC vs. the MAC received.
C.
decrypts the received MAC using a secret key.
D.
authenticate the received message using the sender’s public key.
E.
extracts the MAC from the received message then encrypts the received message with a secret key to produce the MAC
F.
Computes the MAC using the received message and a secret key as inputs to the hash function.