Which of the following MUST Matt, a security administrator, implement to verify both the integrity and
authenticity of a message while requiring a shared secret?
 
A.
 RIPEMD
B.
 MD5
C.
 SHA
D.
 HMAC
Explanation:
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key. The
hashing function provides data integrity, while the symmetric key provides authenticity.
 
                