Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Of the following algorithms which can be used (given specific apps) to authenticate a user online?
RSA
DHE
MD5
SHA3
HASH's are one-way functions and NOT used for authenticity checking. RSA = Ron Rivest, Adi Shamir = asymmetric encryption used to prove authenticity DHE = Diffie Hellman exchange = asymmetric encryption used to prove authenticity ECC = elliptical curve cryptography = asymmetric encryption used to prove authenticity SHA3 = hash MD5 = message digest 5 = hash MAC = message authentication code = hash
This explanation needs clarification. If HASH's are not used for authenticity checking ( which is a questionable assertion since they are in widespread use for password protection) why are three Hash algorithms marked correct ?
DHE can using Men-in-middle attack this mean that did not have authentication
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.