All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
Answer: B. RC4.
You might also like to view...
Which statement is false?
a. Each primitive type has a corresponding type-wrapper class. b. The type-wrapper classes enable you to manipulate primitive-type values as objects. c. Type-wrapper classes are final, so you cannot extend them. d. The methods for primitive types correspond to the methods for the corresponding type-wrapper classes.
If a graph can be reduced by all its processes, then ________.
a) there is no deadlock b) indefinite postponement cannot occur c) the system is in an unsafe state d) none of the above
If a file is password-protected, you can not open the file unless you know the password
Indicate whether the statement is true or false
If a malware program installs itself and then runs on your computer, then your computer is said to have a disease
Indicate whether the statement is true or false