ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 321 - CAS-004 discussion

Report
Export

A security architect updated the security policy to require a proper way to verify that packets received between two parties have not been tampered with and the connection remains private. Which of the following cryptographic techniques can be used to ensure the security policy is being enforced properly?

A.
MD5-based envelope method
Answers
A.
MD5-based envelope method
B.
HMAC SHA256
Answers
B.
HMAC SHA256
C.
PBKDF2
Answers
C.
PBKDF2
D.
PGP
Answers
D.
PGP
Suggested answer: B

Explanation:

The company should use HMAC SHA256 as a cryptographic technique to ensure that packets received between two parties have not been tampered with and the connection remains private. HMAC stands for hash-based message authentication code, which is a method of generating a message authentication code using a cryptographic hash function and a secret key. HMAC can provide both integrity and authenticity of the packets, as well as resistance to replay attacks. SHA256 is a specific hash function that produces a 256-bit output. SHA256 is considered secure and widely used in various cryptographic applications. Verified

Reference:

https://www.ericsson.com/en/blog/2021/7/cryptography-and-privacy-protecting-private-data

https://www.mdpi.com/journal/cryptography/special_issues/Preserve_Enhance_Privacy

https://link.springer.com/article/10.1007/s11432-021-3393-x

asked 02/10/2024
Mithun E
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first