A security administrator implements a web server that utilizes an algorithm that requires other hashing standards to provide data integrity. Which of the following algorithms would meet the requirement?
A. SHA
B. MD5
C. RIPEMD
D. HMAC
Answer: A. SHA
Computer Science & Information Technology
You might also like to view...
Reports are often based on ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ view displays the document in its final form with all proposed changes included and the comments hidden
A) Simple Markup B) No Markup C) All Markup D) Original
Computer Science & Information Technology