You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task? A. MD B. NTLM C. MAC D. SHA Suggested Answer: C Community Answer: C This question is in CISSP-ISSAP Information Systems Security Architecture Professional Exam For getting Information Systems Security Architecture Professional (CISSP-ISSAP) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISC. Trademarks, certification & product names are used for reference only and belong to ISC. The website does not contain actual questions and answers from ISC's Certification Exams.
Please login or Register to submit your answer