Answer the following statements true (T) or false (F)

1. A brute-force attack on a MAC is easier than a brute-force attack on a hash function.
2. Message authentication may also verify sequencing and timeliness.
3. The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
4. Message encryption by itself cannot provide a measure of authentication.
5. If the calculated frame check sequence is equal to the incoming frame check sequence the message is considered authentic.

1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

When a selection is saved to the Quick Parts Gallery, it is assigned to the:

a. Normal category b. General category c. Building Block category

Computer Science & Information Technology

When configuring the virtual network for a VM in VMware Workstation, which network adapter option should you choose if you want the VM to have an IP address assigned rom the host computer?

A. bridged B. host-only C. NAT D. LAN segment

Computer Science & Information Technology