Which of the following is commonly used for verifying message integrity?

A. registration authority
B. CRL
C. pseudorandom number generator
D. hashing function


Answer: D

Computer Science & Information Technology

You might also like to view...

XML tags cannot start with _______ or _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ objects are not limited to audio and video files.

A. Element B. Embedded C. Media D. Steaming

Computer Science & Information Technology

In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company's culture and how decisions are made.

a. true b. false

Computer Science & Information Technology

What interface element shows you the various objects in your database?

A. The Database Tools menu B. The Database Properties pane C. The Home menu D. The Navigation Pane

Computer Science & Information Technology