SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.

A. 48
B. 56
C. 160
D. 256


Answer: C

Computer Science & Information Technology

You might also like to view...

The gesture to zoom in using a Windows 8 touch screen is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the name of the program that reads the settings in the Boot Configuration Data (BCD) file and manages the initial startup of the OS?

A. MBR program B. Session Manager program C. Windows Boot Loader D. Windows Boot Manager

Computer Science & Information Technology

Which of the following OSI layers allows users to access network services such as file sharing?

A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7

Computer Science & Information Technology

Which of the following is described as the simultaneous sending and receiving of networking data?

a. Half-duplex b. latency c. PoE d. Full-duplex

Computer Science & Information Technology