Which of the following are MOST susceptible to birthday attacks?
A. Hashed passwords
B. Digital certificates
C. Encryption passwords
D. One time passwords
Answer: A. Hashed passwords
You might also like to view...
Which of the following is an example of an information asset?
A) Business plans B) Employee records C) Company reputation D) All of the above
What is the primary function of the Image Processor?
A. organizing the image library B. adding effects to images C. converting groups of files to other file formats D. batch processing
A ________ work environment requires new tools to ensure that employees in different locations have what they need to work together to accomplish assigned projects
A) distributed B) practical C) cooperative D) collaboration
Identify the letter of the choice that best matches the phrase or definition.
A. These have behaviors attached to them. B. A list of links C. A scripting language D. Provides a link to more specific information about a topic E. These have inactive, hover, or pressed states. F. The process of downloading all interactive button images at the point at which the page downloads G. Play MP3 files H. An event that opens a Web page in a browser I. This displays a shortcut menu. J. Where the options of a jump menu item are entered