Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?

Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A. Both parties calculate an authenticated MD5 hash value of the data accompanying the message – one party uses the private key, while the other party uses the public key.
B. Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C. Both parties calculate a CRC32 of the data before and after transmission of the message.
D. Both parties obfuscate the data with XOR and a known key before and after transmission of the message.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.