When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?

A. RC4
B. MD5
C. HMAC
D. SHA


Answer: D. SHA

Computer Science & Information Technology

You might also like to view...

A ________ is a central source of data meant to be shared by many users for a variety of applications.

A) database B) data dictionary C) data warehouse D) data model

Computer Science & Information Technology

If you want to allow users to add, edit, and delete records in the database AnnualSales.mdf, what steps would you take to set the database file's Copy to Output Directory property?

What will be an ideal response?

Computer Science & Information Technology

To delete a subfolder from the computer entirely, use the Delete command.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 8-1Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.

A. e-mail programs B. forums C. Webinars D. podcasts

Computer Science & Information Technology