SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.
A. 48
B. 56
C. 160
D. 256
Answer: C
Computer Science & Information Technology
You might also like to view...
The gesture to zoom in using a Windows 8 touch screen is called ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?
A. MBR program B. Session Manager program C. Windows Boot Loader D. Windows Boot Manager
Computer Science & Information Technology
Which of the following OSI layers allows users to access network services such as file sharing?
A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7
Computer Science & Information Technology
Which of the following is described as the simultaneous sending and receiving of networking data?
a. Half-duplex b. latency c. PoE d. Full-duplex
Computer Science & Information Technology