Which of the following MUST Matt, a security administrator, implement to verify both the integrity and
authenticity of a message while requiring a shared secret?
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key. The
hashing function provides data integrity, while the symmetric key provides authenticity.