The MD5 message-digest algorithm is used to ________.

A. Hash a disk to verify that a disk is not altered when you examine it
B. Wipe magnetic media before recycling it
C. Make directories on an evidence disk
D. View graphics files on an evidence drive


Answer: A. Hash a disk to verify that a disk is not altered when you examine it

Computer Science & Information Technology

You might also like to view...

In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To toggle between the Field Properties pane at the bottom of the Design View window and the Table Design pane a user will need to use the ________ key once each time on the keyboard

A) Tab B) F2 C) F6 D) Alt

Computer Science & Information Technology

Use the ________ to copy formatting so that slides have the same look

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ Tool subtly changes the color saturation of an area.

a. Dodge b. Burn c. Sponge d. Saturation

Computer Science & Information Technology