• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which type of attack does the use of HMACs protect against?

  • DoS
  • DDoS
  • brute force
  • man-in-the-middle
Answers Explanation & Hints:

Because only the sender and receiver know the secret key, only parties that have access to that key can compute the digest of an HMAC function. This defeats man-in-the-middle attacks and provides authentication of where the data originated.​

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 21 – 23: Cryptography and Endpoint Protection Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments