ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 179 - CISSP-ISSAP discussion

Report
Export

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

A.
MD
Answers
A.
MD
B.
NTLM
Answers
B.
NTLM
C.
MAC
Answers
C.
MAC
D.
SHA
Answers
D.
SHA
Suggested answer: C
asked 18/09/2024
Bianca Duizer
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first