A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value c*n be mitigated by:
A . generating hash output that is the same size as the original message,
B . requiring the recipient to use a different hash algorithm,
C . using the senders public key to encrypt the message.
D . using a secret key m conjunction with the hash algorithm.
Answer: D
Latest CISM Dumps Valid Version with 1327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund