A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?
- symmetric key and asymmetric key
- message digest and asymmetric key
- IPsec and checksum
- secret key and message digest
Explanation: HMAC implementation is a secret key added to a hash.
More Questions: Cybersecurity Essentials Chapter 5 Quiz Answers