Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

IT Questions BankCategory: CCNAWhich requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

Question:
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

  • nonrepudiation
  • authentication
  • integrity
  • confidentiality

Explanation: Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.​

Exam with this question: Modules 3 – 5: Network Security Exam Answers
Exam with this question: Modules 15 - 17: Cryptography Group Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 21: Public Key Cryptography Quiz Answers
Exam with this question: Network Defense 8.8.2 Module 8: Public Key Cryptography Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x