Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 2 question 85 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 85
Topic #: 2
[All CISSP-ISSAP Questions]

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

  • A. MD
  • B. NTLM
  • C. MAC
  • D. SHA
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
n00r1
10 months, 1 week ago
To implement a hashing method that can resist forgery and is not open to the man-in-the-middle attack, you should use: D. SHA (Secure Hash Algorithm) SHA (Secure Hash Algorithm) is a cryptographic hash function designed to produce a fixed-size output (hash value) that is resistant to forgery and tampering. It is widely used for ensuring data integrity and security in various applications.
upvoted 1 times
...
Banzaaai
2 years, 2 months ago
Selected Answer: C
C. MAC
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...