A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?
Explanation: HMAC provides the additional feature of a secret key to ensure integrity and authentication.
More Questions: Cybersecurity Essentials Chapter 5 Quiz Answers