If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.

A. HCRC
B. MD
C. MAC
D. CRC


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) To have an optional parameter, place the Optional keyword at the beginning of an argument in the method header. b) The optional parameter must provide a default value. c) The optional argument(s) can be placed anywhere in the parameter list of the method header. d) When calling a method, the optional argument can be omitted.

Computer Science & Information Technology

_____ is a strategy by which an organization determinedly and systematically gathers, organizes, stores, analyzes, and shares its collective knowledge and experience.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not one of the steps to secure IIS web server?

a. Disable unneeded services. b. Lock down the system. c. Use hidden fields. d. Enable logging and auditing.

Computer Science & Information Technology

Which of the following is not a home operation system the supports P2P networking?

A. Unix B. macos C. Windows D. Linux

Computer Science & Information Technology