Which of the following hash functions is optimized for use on systems with 8-bit processors?
a. SHA-256
b. SHA-512
c. MD2
d. MD4
Answer: c. MD2
Computer Science & Information Technology
You might also like to view...
Which of the following is a good resource for learning more about the threats to your web applications?
a. php My Admin b. MITM c. XSS d. OWASP
Computer Science & Information Technology
A characteristic of defensive programming is:
a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above
Computer Science & Information Technology
The ASCII character set is a superset of the Unicode character set.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
A. loud auditor B. cloud service consumer C. cloud broker D. cloud carrier
Computer Science & Information Technology