CompTIA Exam Questions

Which of the following algorithms should the software developer utilize?

A software developer utilizes cryptographic functions to generate codes that verify message
integrity. Due to the nature if the data that is being sent back and forth from the client application
to the server, the developer would like to change the cryptographic function to one that verities
both authentication and message integrity. Which of the following algorithms should the software
developer utilize?

A.
HMAC

B.
SHA

C.
Two Fish

D.
RIPEMD