Answer the following statements true (T) or false (F)
1. Virtually all cryptographic hash functions involve the iterative use of a compression function.
2. A good hash function has the property that “the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random”.
3. Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
4. Hash functions can be used for intrusion and virus detections.
5. Whirlpool is a popular cryptographic hash function.
1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE
You might also like to view...
To determine each object's exact location, we can use the world's ____.
A. methods B. properties C. axes D. functions
Which of the following statements best describes a packet filtering firewall?
A) It examines each packet against a set of criteria. B) It can keep track of the status of the connection. C) It works by examining the client application to determine if traffic is permitted. D) It authenticates the client before examining the application.
Most of the time, you'll want to include a subset of the fields on a form.
Answer the following statement true (T) or false (F)
Programs that translate high-level-language programs into machine language are called .
Fill in the blank(s) with the appropriate word(s).