When hashing a message, which of the following security goals is being provided?

A. Integrity
B. Confidentiality
C. Encryption
D. Availability


Answer: A. Integrity

Computer Science & Information Technology

You might also like to view...

You can look at the ____ command as being the extreme version of the transformations, only with it, can you move the four handles of the bounding box independently of one another.

A. Skew B. Drive C. Rotate D. Distort

Computer Science & Information Technology

The _____ area on the status bar displays common calculations, such as SUM or AVERAGE, for selected numbers in the worksheet.

A. AutoFormat B. AutoComplete C. AutoFunction D. AutoCalculate

Computer Science & Information Technology

Which of the following is not an object of the ostream class?

a. cout b. cerr c. cin d. clog

Computer Science & Information Technology

The manipulation of addresses using pointers ____ knowledge of the actual addresses.

A. requires B. generally does not require C. often requires D. never requires

Computer Science & Information Technology