Which type of attack does the use of HMACs protect against?
- DoS
- DDoS
- brute force
- man-in-the-middle
Answers Explanation & Hints:
Because only the sender and receiver know the secret key, only parties that have access to that key can compute the digest of an HMAC function. This defeats man-in-the-middle attacks and provides authentication of where the data originated. |