What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?
a. md5sum
b. hashlog
c. checksum
d. hash
ANSWER: d
Computer Science & Information Technology
You might also like to view...
The role of ____________ is to establish and sustain the proper long term functioning of a business process.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What is the length of time an IP address is assigned to a switch port called?
a. Delay time b. Enable time c. Aging time d. Access time
Computer Science & Information Technology
Malware usually enters a computer system with the user's knowledge.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Protection of Children Against Sexual Exploitation Act of 1977 did not expressly prohibit explicit depictions of children which did not have redeeming social value
Indicate whether the statement is true or false.
Computer Science & Information Technology