Which of the following hash functions contains demonstrated collision vulnerabilities and is not considered secure?
a. SHA-256
b. SHA-512
c. MD2
d. MD4
Answer: d. MD4
Computer Science & Information Technology
You might also like to view...
Describe in basic terms what an IDPS is.
What will be an ideal response?
Computer Science & Information Technology
The most robust level of security that can be achieved today for wireless LANs is using the ____ model.
A. personal security B. transitional security C. temporal security D. enterprise security
Computer Science & Information Technology
Bitmap images are created by bits or:
A) shapes. B) bytes. C) mathematical statements. D) pixels.
Computer Science & Information Technology
Which of the following types of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?
a. Light b. Normal c. Medium d. Heavy
Computer Science & Information Technology