SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.

A. 48
B. 56
C. 160
D. 256

Answer: C

Computer Science & Information Technology

You might also like to view...

What antispyware and antivirus software is included with Windows 8.1?

A) Windows Defender B) Windows Firewall C) Action Center D) Windows Updates

Computer Science & Information Technology

Beth evaluated the potential risk of a hacker entering a specific system and decided that it did not justify the cost of purchasing an expensive intrusion detection system. What type of risk management is Beth practicing?

a. Risk mitigation b. Risk avoidance c. Risk transference d. Risk acceptance

Computer Science & Information Technology