What are two reasons for using HMACs? (Choose two.)
A.
data integrity
B.
hash encryption
C.
source authentication
D.
simplify device configuration
What are two reasons for using HMACs? (Choose two.)
What are two reasons for using HMACs? (Choose two.)
A.
data integrity
B.
hash encryption
C.
source authentication
D.
simplify device configuration