Which type of attack does the use of HMACs protect against?
- brute force
- DDoS
- DoS
- man-in-the-middle
Explanation: Because only the sender and receiver know the secret key, only parties that have access to that key can compute the digest of an HMAC function. This defeats man-in-the-middle attacks and provides authentication of where the data originated.
Exam with this question: Checkpoint Exam: Cryptography and Endpoint Protection Group Exam
Exam with this question: CCNA Cyber Ops Chapter 9 Exam Answers
Exam with this question: Module 16: Quiz – Basic Integrity and Authenticity Network Security
Please login or Register to submit your answer