Which of the following are MOST susceptible to birthday attacks?

A. Hashed passwords
B. Digital certificates
C. Encryption passwords
D. One time passwords

Answer: A. Hashed passwords

Computer Science & Information Technology

You might also like to view...

A character that creates a solid, dotted, or dashed line that fills the space to the left of a tab character is referred to as a:

A) dot leader. B) leader character. C) tab. D) symbol.

Computer Science & Information Technology

The Privacy Act defined the following ways in which personal information may be used by the government (select all that apply):

a. No record keeping system may exist which is kept secret from the general public. b. The US Government has every right to collect information on any individual and use it however it deems necessary. c. All information maintained by the US Government must be made available under the Freedom of Information Act, which was part of this legislation. d. If an individual discovers that information stored by the US Government is incorrect, there must be a mechanism in place by which the individual can have the errors corrected. e. Individuals have the right to prevent information collected for a specific purpose from being used for other purposes without their permission.

Computer Science & Information Technology