MD5 and SHA-1 are examples of which of the following?
A. Communication protocols
B. Hashing algorithms
C. Encryption algorithms
D. Transport protocols
Answer: B
Explanation: MD5 and SHA-1 are hashing algorithms used to obtain a digital hash.
You might also like to view...
Can a static method access instance data in a class?
What will be an ideal response?
Authentication server scripts more secure than workstation login scripts because ________.
a) a single login allows a user access to multiple applications b) user passwords are encrypted to hide them from other users c) passwords are maintained in only one (typically secure) location d) none of the above
You cannot select text using the keyboard.
Answer the following statement true (T) or false (F)
When reading, a ____________________ is defined as a string of characters ending with the end-of-line escape sequence or the end of the file.
Fill in the blank(s) with the appropriate word(s).