Which of the following hash functions is optimized for use on systems with 8-bit processors?

a. SHA-256
b. SHA-512
c. MD2
d. MD4


Answer: c. MD2

Computer Science & Information Technology

You might also like to view...

Which of the following is a good resource for learning more about the threats to your web applications?

a. php My Admin b. MITM c. XSS d. OWASP

Computer Science & Information Technology

A characteristic of defensive programming is:

a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above

Computer Science & Information Technology

The ASCII character set is a superset of the Unicode character set.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A. loud auditor B. cloud service consumer C. cloud broker D. cloud carrier

Computer Science & Information Technology