单项选择题
Which example is of a function intended for cryptographic hashing?()
A.MD65
B.SHA-135
C.XR12
D.MD5
点击查看答案
相关考题
-
单项选择题
WhichoneofthefollowingitemsmaybeaddedtoapasswordstoredinMD5tomakeitmoresecure?()
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table -
单项选择题
Whichitemisthegreatmajorityofsoftwarevulnerabilitiesthathavebeendiscovered?()
A.Stack vulnerabilities
B.Heap overflows
C.Software overflows
D.Buffer overflows -
单项选择题
Whichstatementistrueaboutvishing?()
A.Influencing users to forward a call to a toll number (for example, a long distance or international number)
B.Influencing users to provide personal information over a web page
C.Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number)
D.Influencing users to provide personal information over the phone
