The MD5 message-digest algorithm is used to ________.

A. Hash a disk to verify that a disk is not altered when you examine it
B. Wipe magnetic media before recycling it
C. Make directories on an evidence disk
D. View graphics files on an evidence drive

Answer: A. Hash a disk to verify that a disk is not altered when you examine it

Computer Science & Information Technology

You might also like to view...

An advantage of adding a field in ________ is that you name the field and set the data type when you insert the field

A) Table view B) Design view C) Datasheet view D) PivotTable view

Computer Science & Information Technology

LINQ to Objects works with objects that implement the __________ interface, which enables a program to iterate over a collection of data.

a) ICountable b) IEnumerable c) IRepeatable d) ICompare

Computer Science & Information Technology