SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.
A. 48
B. 56
C. 160
D. 256
Answer: C
Computer Science & Information Technology
You might also like to view...
What antispyware and antivirus software is included with Windows 8.1?
A) Windows Defender B) Windows Firewall C) Action Center D) Windows Updates
Computer Science & Information Technology
Beth evaluated the potential risk of a hacker entering a specific system and decided that it did not justify the cost of purchasing an expensive intrusion detection system. What type of risk management is Beth practicing?
a. Risk mitigation b. Risk avoidance c. Risk transference d. Risk acceptance
Computer Science & Information Technology