List of questions
Related questions
Question 321 - CAS-004 discussion
A security architect updated the security policy to require a proper way to verify that packets received between two parties have not been tampered with and the connection remains private. Which of the following cryptographic techniques can be used to ensure the security policy is being enforced properly?
A.
MD5-based envelope method
B.
HMAC SHA256
C.
PBKDF2
D.
PGP
Your answer:
0 comments
Sorted by
Leave a comment first