If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A. HCRC
B. MD
C. MAC
D. CRC


Answer: C

Computer Science & Information Technology

You might also like to view...

Where are mounted directories located?

a. /home b. /usr c. /var d. /mnt

Computer Science & Information Technology

A menu can be created with a:

What will be an ideal response?

Computer Science & Information Technology

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

A. Auditing B. Authentication C. Authorizations D. Availability

Computer Science & Information Technology

During the detailed feasibility study of the project, the systems professional who proposed the project should be involved in performing the study.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology