What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?

a. md5sum
b. hashlog
c. checksum
d. hash


ANSWER: d

Computer Science & Information Technology

You might also like to view...

The role of ____________ is to establish and sustain the proper long term functioning of a business process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the length of time an IP address is assigned to a switch port called?

a. Delay time b. Enable time c. Aging time d. Access time

Computer Science & Information Technology

Malware usually enters a computer system with the user's knowledge.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Protection of Children Against Sexual Exploitation Act of 1977 did not expressly prohibit explicit depictions of children which did not have redeeming social value

Indicate whether the statement is true or false.

Computer Science & Information Technology