The appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.

A. MAC
B. HMAC
C. GMAC
D. CMAC


B. HMAC

Computer Science & Information Technology

You might also like to view...

The frame aspect ratio of a standard-format, standard-definition video is _____.

A. 4:3 B. 16:9 C. 1.0 D. 0.9 E. 1.2

Computer Science & Information Technology

When you make a copy of a(n) ____ in case the original is damaged, the copy preserves the same quality as the original.

A. movie B. DVD movie C. CD D. audio clip

Computer Science & Information Technology

You need to enable MAC address _____________ if any network communication from the virtual machine will use a MAC address other than the MAC address configured in the virtual machine.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you hold down the CTRL key while rolling the mouse wheel, text on the screen may become larger or smaller based on the direction you roll the wheel. _______________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology