What can be used as an alternative to HMAC?
- SHA
- MD5
- symmetric encryption algorithms
- digital signatures
Explanation: Both HMAC and digital signatures are used to guarantee that messages are authentic. MD5 and SHA are considered legacy algorithms that should be avoided because they have security flaws. Encryption algorithms ensure data confidentiality rather than authentication.
Exam with this question: CCNA Security Practice Final Exam Answers
Please login or Register to submit your answer