PrepAway - Latest Free Exam Questions & Answers

Which of the following algorithms would meet the requirement?

A security administrator implements a web server that utilizes an algorithm that requires other
hashing standards to provide data integrity. Which of the following algorithms would meet the
requirement?

PrepAway - Latest Free Exam Questions & Answers

A.
SHA

B.
MD5

C.
RIPEMD

D.
HMAC

4 Comments on “Which of the following algorithms would meet the requirement?

  1. Lake says:

    Correct answer is A, not D.

    SHA stands for “secure hash algorithm”. SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It is used to ensure data integrity.

    You cannot configure your browser to use HMAC to secure communication.
    A keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and the authentication of a message.




    0



    0
  2. tester says:

    the key words here are “algorithm that requires other
    hashing standards to provide data integrity” and that is HMAC, because HMAC uses MD5 or SHA to provide integrity.

    I go with D




    0



    0
  3. captcaveman says:

    The answer is D. HMAC
    TLS uses HMAC. If you don’t believe me then sniff the wire between you and a webserver using whatever web browser. You will find it listed in the cipher suite list within the client hello message.




    0



    0

Leave a Reply