MD5 and SHA-1 are examples of which of the following?

A. Communication protocols
B. Hashing algorithms
C. Encryption algorithms
D. Transport protocols


Answer: B
Explanation: MD5 and SHA-1 are hashing algorithms used to obtain a digital hash.

Computer Science & Information Technology

You might also like to view...

Can a static method access instance data in a class?

What will be an ideal response?

Computer Science & Information Technology

Authentication server scripts more secure than workstation login scripts because ________.

a) a single login allows a user access to multiple applications b) user passwords are encrypted to hide them from other users c) passwords are maintained in only one (typically secure) location d) none of the above

Computer Science & Information Technology

You cannot select text using the keyboard.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When reading, a ____________________ is defined as a string of characters ending with the end-of-line escape sequence or the end of the file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology