The security manager must store a copy of a sensitive document and needs to verify at a later point that the document has not been altered. Which of the following will accomplish the security manager's objective?
A. RSA
B. AES
C. MD5
D. SHA
Answer: C. MD5
You might also like to view...
____ view shows the document on a mock sheet of paper in the document window.
A. Print Layout B. Navigation C. Web D. Options
This code displays text in integer1JTextField, double1JTextField, and integer2JTextField. What is displayed in these JTextFields?
``` 1 private void pickRandomNumbers() 2 { 3 Random randomObject = new Random(); 4 5 int number1 = randomObject.nextInt(); 6 double number = 5 * randomObject.nextDouble(); 7 int number2 = 1 + randomObject.nextInt( 11 ); 8 integer1JTextField.setText = String.valueOf( number1 ); 9 double1JTextField.setText = String.valueOf( number ); 10 integer2JTextField.setText = String.valueOf( number2 ); 11 12 } // end method pickRandomNumbers ```
Fast Ethernet adopted the point-to-point and the ____________________ network topology with a switch or hub as a central node of the network.
Fill in the blank(s) with the appropriate word(s).
Certifications are designed to recognize ____________________ in their respective fields.
Fill in the blank(s) with the appropriate word(s).