The types of functions that may be used to produce an authenticator are grouped into three classes: hash function, message authentication code, and ___________ .
Fill in the blank(s) with the appropriate word(s).
message encryption
Computer Science & Information Technology
You might also like to view...
Using Filter by Form enables you to filter on multiple criteria
Indicate whether the statement is true or false
Computer Science & Information Technology
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following attacks?
A. Spoofing B. Man-in-the-middle C. Dictionary D. Brute force E. Privilege escalation
Computer Science & Information Technology