A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)
- HMAC
- MD5
- 3DES
- SHA-1
- AES
Explanation:The task to ensure that only authorized personnel can open a file is data confidentiality, which can be implemented with encryption. AES and 3DES are two encryption algorithms. HMAC can be used for ensuring origin authentication. MD5 and SHA-1 can be used to ensure data integrity.
Exam with this question: Modules 21 - 23: Cryptography and Endpoint Protection Group Exam
Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: Network Security 1.0 Final Exam Answers
Exam with this question: Network Defense (NetDef) Course Final Exam Answers
Please login or Register to submit your answer