A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the nature if the data that is being sent back and forth from the client application to the server, the developer would like to change the cryptographic function to one that verities both authentication and message integrity. Which of the following algorithms should the software developer utilize?
A. HMAC
B. SHA
C. Two Fish
D. RIPEMD
Answer: D. RIPEMD
You might also like to view...
How fast is a gigahertz?
A) 1 billion electrical vibrations per second B) 1 million electrical vibrations per second C) 1 quadrillion electrical vibrations per second D) 1 trillion electrical vibrations per second
The default printer is indicated by a green square
Indicate whether the statement is true or false
When creating an Excel document, you should avoid using _____ text and background together, since this is the most common form of color blindness.
A. red and green B. yellow and blue C. black and white D. red and yellow
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.
A. Counterfeit software B. Pirated software C. Ethical software D. Governance software