exam questions

Exam 210-250 All Questions

View all questions & answers for the 210-250 exam

Exam 210-250 topic 1 question 301 discussion

Actual exam question from Cisco's 210-250
Question #: 301
Topic #: 1
[All 210-250 Questions]

Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?

  • A. Both parties calculate an authenticated MD5 hash value of the data accompanying the message - one party uses the private key, while the other party uses the public key.
  • B. Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
  • C. Both parties calculate a CRC32 of the data before and after transmission of the message.
  • D. Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
gnuga
3 years, 8 months ago
I think it should be (A)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago