Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
Explanation: Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.
More Questions: Modules 3 – 5: Network Security Exam Answers