You are concerned that an electronically transmitted message may be intercepted and
manipulated as if it came from you. This would compromise the accuracy of the communications.
To secure the validity of the original message sent, you attach a _______.
A.
Tag
B.
Sender flag.
C.
Diffie-Hellman verification.
D.
Private key.
E.
Digital signature.
Explanation:
: In this case we need a feature of network security known as “Integrity”, we need to be sure that
the data has not changed from the source to the destination, this could be achieved through the
use of digital signatures, Checkpoint provides support for the following algorithms: MD5 and SHA-1. Those can provide the desired functionality.