Answer the following statements true (T) or false (F)
1. The cryptographic hash function is not a versatile cryptographic algorithm.
2. It is possible to use a hash function but no encryption for message authentication.
3. Encryption hardware is optimized toward smaller data sizes.
4. Hash functions are commonly used to create a one-way password file.
5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
____ speech is not protected.
A. Political B. Dangerous C. Encyclopedic D. Derogatory
Which of the following is a reason security professionals can use a packet sniffer for?
a. To plan a DoS attack b. To capture user names and passwords c. To check if the encryption used is strong enough d. To capture sensitive documents
The ____ file is typically saved with a prefix of inc_.
A. insert B. include C. nested D. increment
In a posttest loop, the condition is evaluated before the instructions within the loop are processed.
Answer the following statement true (T) or false (F)