All of the following are valid cryptographic hash functions EXCEPT:

A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.


Answer: B. RC4.

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. Each primitive type has a corresponding type-wrapper class. b. The type-wrapper classes enable you to manipulate primitive-type values as objects. c. Type-wrapper classes are final, so you cannot extend them. d. The methods for primitive types correspond to the methods for the corresponding type-wrapper classes.

Computer Science & Information Technology

If a graph can be reduced by all its processes, then ________.

a) there is no deadlock b) indefinite postponement cannot occur c) the system is in an unsafe state d) none of the above

Computer Science & Information Technology

If a file is password-protected, you can not open the file unless you know the password

Indicate whether the statement is true or false

Computer Science & Information Technology

If a malware program installs itself and then runs on your computer, then your computer is said to have a disease

Indicate whether the statement is true or false

Computer Science & Information Technology