• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)

  • MD5
  • AES
  • 3DES
  • SHA-1
  • HMAC
Answers Explanation & Hints:

The task to ensure that only authorized personnel can open a file is data confidentiality, which can be implemented with encryption. AES and 3DES are two encryption algorithms. HMAC can be used for ensuring origin authentication. MD5 and SHA-1 can be used to ensure data integrity.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 21 – 23: Cryptography and Endpoint Protection Group Exam Answers Full 100%

Network Security 1.0 Final Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments