Posted by: Pdfprep
Post Date: November 28, 2020
Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A . Both parties calculate an authenticated MD5 hash value of the data accompanying the message – one party uses the private key, while the other party uses the public key.
B . Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C . Both parties calculate a CRC32 of the data before and after transmission of the message.
D . Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
Answer: B
Leave a Reply