ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 39 Topic 4 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 39 Topic 4 Discussion

212-82 Exam Topic 4 Question 39 Discussion:
Question #: 39
Topic #: 4

In an advancedcybersecurity research lab. a team Is working on developing a new cryptographicprotocol to secure highly sensitive communication. Their goal is to create aprotocol that is resilient against quantum computing attacks, which couldpotentially break many current encryption methods. During their research, theyfocus on the use of hash functions in their protocol. The team experiments withvarious hash functions to ensure the highest level of security. Considering thethreat of quantum computing, which of the following hash functions would be themost appropriate choice fortheir protocol?


A.

SHA-256, due to its widespread use and proven security track record


B.

MD5, for its speed and efficiency in generating hash values


C.

HMAC. for its ability to provide data integrity and authentication


D.

SHA-3. as it is designed to be resistant against quantum computing attacks


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.