A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)
Explanation:The task to ensure that only authorized personnel can open a file is data confidentiality, which can be implemented with encryption. AES and 3DES are two encryption algorithms. HMAC can be used for ensuring origin authentication. MD5 and SHA-1 can be used to ensure data integrity.
More Questions: Modules 21 – 23: Cryptography and Endpoint Protection Group Exam
More Questions: CCNA Cyber Ops Final Exam Answers
More Questions: Network Security 1.0 Final Exam Answers