Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A.
Both parties calculate an authenticated MD5 hash value of the data accompanying the message - one party uses the private key, while the other party uses the public key.
B.
Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C.
Both parties calculate a CRC32 of the data before and after transmission of the message.
D.
Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
This section is not available anymore. Please use the main Exam Page.210-250 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
gnuga
3 years, 8 months ago