What are two reasons for using HMACs? (Choose two.)
A.
source authentication
B.
simplify device configuration
C.
data integrity
D.
hash encryption
What are two reasons for using HMACs? (Choose two.)
What are two reasons for using HMACs? (Choose two.)
A.
source authentication
B.
simplify device configuration
C.
data integrity
D.
hash encryption