Which of the following hash functions contains demonstrated collision vulnerabilities and is not considered secure?

a. SHA-256
b. SHA-512
c. MD2
d. MD4


Answer: d. MD4

Computer Science & Information Technology

You might also like to view...

Describe in basic terms what an IDPS is.

What will be an ideal response?

Computer Science & Information Technology

The most robust level of security that can be achieved today for wireless LANs is using the ____ model.

A. personal security B. transitional security C. temporal security D. enterprise security

Computer Science & Information Technology

Bitmap images are created by bits or:

A) shapes. B) bytes. C) mathematical statements. D) pixels.

Computer Science & Information Technology

Which of the following types of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?

a. Light b. Normal c. Medium d. Heavy

Computer Science & Information Technology