Answer the following statements true (T) or false (F)

1. Virtually all cryptographic hash functions involve the iterative use of a compression function.
2. A good hash function has the property that “the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random”.
3. Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
4. Hash functions can be used for intrusion and virus detections.
5. Whirlpool is a popular cryptographic hash function.


1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

To determine each object's exact location, we can use the world's ____.

A. methods B. properties C. axes D. functions

Computer Science & Information Technology

Which of the following statements best describes a packet filtering firewall?

A) It examines each packet against a set of criteria. B) It can keep track of the status of the connection. C) It works by examining the client application to determine if traffic is permitted. D) It authenticates the client before examining the application.

Computer Science & Information Technology

Most of the time, you'll want to include a subset of the fields on a form.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Programs that translate high-level-language programs into machine language are called .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology