SHA-2 is an example of a:

a. Message digest
b. Stream cipher
c. Block cipher
d. Key exchange


a. Message digest

Computer Science & Information Technology

You might also like to view...

Which of the following is not a Java AWT portability issue?

a. GUI components that have different looks on different platforms may use different amounts of space. b. GUI components may have different default functionality. c. Different platforms may have different representations of integers. d. All of the above.

Computer Science & Information Technology

A heap in which the key value of each node is greater than or equal to the key value in each of its descendents is called a ____.

A. max heap B. min heap C. treap D. pyramid

Computer Science & Information Technology

Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a single 8-bit DS0 data sample?

A. DS1 B. DS2 C. DS3 D. DS4

Computer Science & Information Technology

Jerry's Guide, one of the first directories, was renamed ____ in 1995.

A. Google B. Yahoo! C. Bing D. Searchme

Computer Science & Information Technology