When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?

When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?
A. RC4
B. MD5
C. HMAC
D. SHA

How To Pass SY0-601 Exam?

CompTIA SY0-601 PDF dumps.

High quality SY0-601 pdf and software. VALID exam to help you pass.

comptia-exams

One thought on “When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?

  1. D – Although difficult, X.509 certificates that use MD5 and SHA1 hashes can be compromised. Today’s implementations will focus on Secure Hash Algorithm (SHA) 2 algorithms. As a note, SHA 256, SHA 384, and SHA 512 are known as SHA 2. Common hashing algorithms you will see for X-509 certificate hashing are SHA 256, SHA 384, SHA 512, and MD5. SHA-1 appears to be more secure than MD5 in many regards.
    https://adamtheautomator.com/x-509-certificate-tutorial/

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.