CEH: Cryptographic Attacks and De...
Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. How does HMAC differ from normal hashing methods:
It uses a secret key to generate the hash function
It uses different hashing algorithms
It uses public-key encryption to generate the hash