Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A . Both parties calculate an authenticated MD5 hash value of the data accompanying the message – one party uses the private key, while the other party uses the public key.
B . Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C . Both parties calculate a CRC32 of the data before and after transmission of the message.
D . Both parties obfuscate the data with XOR and a known key before and after transmission of the message.

Answer: B

Leave a Reply

Your email address will not be published.