Which of the following is the LEAST secure hashing algorithm?

A. SHA1
B. RIPEMD
C. MD5
D. DES


Answer: C. MD5

Computer Science & Information Technology

You might also like to view...

In object-oriented programming, the ___________ is more general than classes related to it.

a. container class b. default design c. base class d. derived class

Computer Science & Information Technology

In Access form, a form ________ is an object that displays data, performs an action, and enables you to view and work with information

Fill in the blank(s) with correct word

Computer Science & Information Technology

Joe, the junior technician, is helping with a department move to a different area of the building. Which two of the following are true regarding this move? (Select two.)

A) When connecting surge strips, Joe should ensure they are not installed in a walk path of the office area. B. Joe should install new surge protectors. C. Joe should verify the electrical outlet voltage. D. Joe should use a cart when moving the equipment. E. Joe should not set tower computers on a carpeted area.

Computer Science & Information Technology

Network firewalls can monitor and report suspicious network traffic, but are unable to filter out or block incoming or outgoing network traffic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology