The security manager must store a copy of a sensitive document and needs to verify at a later point that the document has not been altered. Which of the following will accomplish the security manager's objective?

A. RSA
B. AES
C. MD5
D. SHA

Answer: C. MD5

Computer Science & Information Technology

You might also like to view...

Which of the following statement best describes segregation of duties?

A. Two individuals must both complete their half of a specific task. B. No one individual can control a process from start to finish. C. Two individuals complete the same task simultaneously. D. Two individuals complete different tasks at the same time.

Computer Science & Information Technology

Propose an algorithm for finding an intersection of two large relations (i.e., ones that do not fit in main memory) using hashing.

What will be an ideal response?

Computer Science & Information Technology