A security administrator implements a web server that utilizes an algorithm that requires other hashing standards to provide data integrity. Which of the following algorithms would meet the requirement?

A. SHA
B. MD5
C. RIPEMD
D. HMAC

Answer: A. SHA

Computer Science & Information Technology

You might also like to view...

Reports are often based on ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ view displays the document in its final form with all proposed changes included and the comments hidden

A) Simple Markup B) No Markup C) All Markup D) Original

Computer Science & Information Technology