Which of the following MUST Matt, a security administrator, implement to verify both the integrity
and authenticity of a message while requiring a shared secret?

A.
RIPEMD
B.
MD5
C.
SHA
D.
HMAC
Explanation:
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a
symmetric key. The hashing function provides data integrity, while the symmetric key provides
authenticity.