The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).
A. HMAC B. XOR
C. RSA D. SHA-1
D. SHA-1
You might also like to view...
To open a file for read-write and random access requires
a. The usual definition of an ofstream or ifstream object.
b. A call to open ofstream or ifstream object, but there must be a second argument to the open function.
c. The stream to be defined using the class fstream. defined in the
Which logical unit of the computer sends information that has already been processed by the computer to various devices so that the information may be used outside the computer? _______ .
Fill in the blank(s) with the appropriate word(s).
The purpose of SETA is to enhance security in all but which of the following ways?
A. by building in-depth knowledge B. by adding barriers C. by developing skills D. by improving awareness
In a linked list, each element contains two parts: data and a description of the data.
Answer the following statement true (T) or false (F)