Which of the following employs a 160-bit hash?
A. MD5
B. SHA-1
C. SHA-2
D. NTLM
B. SHA-1 employs a 160-bit hash. MD5 is 128 bit. SHA-2 can be 256 bit or 512 bit.
You might also like to view...
Given this function prototype void CalcTotal(float numbers[]),what is wrong with this function?
```void CalcTotal(float numbers) { float total; for(int I = 0; I < 6 ++I) { total = total + numbers[I]; } }``` A. The function header line doesn’t match the prototype. B. There is a data type in the function header line. C. I is capitalized. D. The function is correct.
Use the ________ feature to look for objects that may not be supported in earlier versions of PowerPoint
A) Compatibility Checker B) Accessibility Checker C) Properties Inspector D) Document Inspector
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
A. VSP B. DTP C. ISP D. CAD
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
a. ghost b. jabber c. talker d. blabber