A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value c*n be mitigated by:

A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value c*n be mitigated by:
A . generating hash output that is the same size as the original message,
B . requiring the recipient to use a different hash algorithm,
C . using the senders public key to encrypt the message.
D . using a secret key m conjunction with the hash algorithm.

Answer: D

Latest CISM Dumps Valid Version with 1327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments