What are the SHA hash generating algorithms used for?
- Authentication
- Confidentiality
- Integrity
- Nonrepudiation
Explanation: Integrity is ensured by implementing SHA hash generating algorithms. Many modern networks ensure authentication with protocols such as HMACs. Data confidentiality is ensured through symmetric encryption algorithms, including 3DES and AES. Data confidentiality can also be ensured using asymmetric algorithms.
Exam with this question: 3.11.3 Module Quiz - Network Security Concepts
Please login or Register to submit your answer