Which statement is a feature of HMAC?
- HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks.
- HMAC uses protocols such as SSL or TLS to provide session layer confidentiality.
- HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance.
- HMAC is based on the RSA hash function.
Explanation: A keyed-hash message authentication code (HMAC or KHMAC) is a type of message authentication code (MAC). HMACs use an additional secret key as input to the hash function, adding authentication to data integrity assurance.
Exam with this question: CCNA Cyber Ops Chapter 9 Exam Answers
Exam with this question: Network Security 1.0 Final Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 21: Public Key Cryptography Quiz Answers
Exam with this question: CCNA Security Chapter 7 Exam (CCNAS v1.2)
Exam with this question: Network Defense 8.8.2 Module 8: Public Key Cryptography Quiz
Please login or Register to submit your answer