If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.
A. HCRC
B. MD
C. MAC
D. CRC
Answer: C
You might also like to view...
Which of the following statements is false?
a) To have an optional parameter, place the Optional keyword at the beginning of an argument in the method header. b) The optional parameter must provide a default value. c) The optional argument(s) can be placed anywhere in the parameter list of the method header. d) When calling a method, the optional argument can be omitted.
_____ is a strategy by which an organization determinedly and systematically gathers, organizes, stores, analyzes, and shares its collective knowledge and experience.
Fill in the blank(s) with the appropriate word(s).
Which of the following is not one of the steps to secure IIS web server?
a. Disable unneeded services. b. Lock down the system. c. Use hidden fields. d. Enable logging and auditing.
Which of the following is not a home operation system the supports P2P networking?
A. Unix B. macos C. Windows D. Linux