A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?
- IPsec and checksum
- message digest and asymmetric key
- secret key and message digest
- symmetric key and asymmetric key
Для просмотра статистики ответов нужно
войти.