Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:November 15, 2020
  • Reading time:1 mins read

Last Updated on November 15, 2020 by Admin

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

  • confidentiality
  • authentication
  • integrity
  • nonrepudiation
    Answers Explanation & Hints:

    Integrity is ensured by implementing either MD5 or SHA hash generating algorithms. Many modern networks ensure authentication with protocols, such as HMAC. Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES. Data confidentiality can also be ensured using asymmetric algorithms, including RSA and PKI.​

For more question and answers:

Click Here CCNA3 v7 – ENSA – Modules 3 – 5: Network Security Exam Answers Full 100%

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments