Which two steps does a receiver perform to validate a message using HMAC? ()  

A .  decrypts the received MAC using a secret key B .  compares the computed MAC vs. the MAC received C .  authenticate the receivedmessage using the sender’s public key D .  look up the sender’s public key E .  extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC F .  Computes the MAC using the receivedmessage and a secret key as inputs to the hash functio

时间:2022-08-27 19:40:24 所属题库:CCIE(350-018)题库

相似题目