A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?

IT Questions BankCategory: Cybersecurity EssentialsA user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?

A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?

  • symmetric key and asymmetric key
  • message digest and asymmetric key
  • IPsec and checksum
  • secret key and message digest

Explanation: HMAC implementation is a secret key added to a hash.

Exam with this question: Cybersecurity Essentials Chapter 5 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments