Which of the following MUST Matt, a security administrator, implement to verify both the integrity and
authenticity of a message while requiring a shared secret?

A.
RIPEMD
B.
MD5
C.
SHA
D.
HMAC
Explanation:
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key. The
hashing function provides data integrity, while the symmetric key provides authenticity.