Which of the following authentication types uses MD5?

a. Basic
b. Message digest
c. Certificate-based
d. Form-based


ANS: B

Computer Science & Information Technology

You might also like to view...

Suppose you are assigned to manage a virtual team.  Which of the following will you NOT do?

A. define goals, and set expectations B. be aware of team members cultural sensitivity C. ensure the team members are familiar with each other at a personal level D. hold team meetings regularly - whether the team members like it or not

Computer Science & Information Technology

_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

A. Computers as targets B. Computers as storage devices C. Computers as mediums D. Computers as communication tools

Computer Science & Information Technology

The ________ is an interface for building and editing macros

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Windows Vista 7 Premium, an encrypted file can be decrypted using the cipher command

Indicate whether the statement is true or false

Computer Science & Information Technology