Which of the following authentication types uses MD5?
a. Basic
b. Message digest
c. Certificate-based
d. Form-based
ANS: B
You might also like to view...
Suppose you are assigned to manage a virtual team. Which of the following will you NOT do?
A. define goals, and set expectations B. be aware of team members cultural sensitivity C. ensure the team members are familiar with each other at a personal level D. hold team meetings regularly - whether the team members like it or not
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.
A. Computers as targets B. Computers as storage devices C. Computers as mediums D. Computers as communication tools
The ________ is an interface for building and editing macros
Fill in the blank(s) with correct word
In Windows Vista 7 Premium, an encrypted file can be decrypted using the cipher command
Indicate whether the statement is true or false