List of questions
Related questions
Question 179 - CISSP-ISSAP discussion
You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?
A.
MD
B.
NTLM
C.
MAC
D.
SHA
Your answer:
0 comments
Sorted by
Leave a comment first