Which of the following employs a 160-bit hash?

A. MD5
B. SHA-1
C. SHA-2
D. NTLM


B. SHA-1 employs a 160-bit hash. MD5 is 128 bit. SHA-2 can be 256 bit or 512 bit.

Computer Science & Information Technology

You might also like to view...

Given this function prototype void CalcTotal(float numbers[]),what is wrong with this function?

```void CalcTotal(float numbers) { float total; for(int I = 0; I < 6 ++I) { total = total + numbers[I]; } }``` A. The function header line doesn’t match the prototype. B. There is a data type in the function header line. C. I is capitalized. D. The function is correct.

Computer Science & Information Technology

Use the ________ feature to look for objects that may not be supported in earlier versions of PowerPoint

A) Compatibility Checker B) Accessibility Checker C) Properties Inspector D) Document Inspector

Computer Science & Information Technology

Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?

A. VSP B. DTP C. ISP D. CAD

Computer Science & Information Technology

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

a. ghost b. jabber c. talker d. blabber

Computer Science & Information Technology