Author Question: Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) ... (Read 106 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
 
  What will be an ideal response?

Question 2

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:
 
  A)
 
  Application security
  B)
 
  Operating systems security
  C)
 
  Network security
  D)
 
  Middleware and Web services security
  E)
 
  None of the above



Amiracle

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

SHA-2

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

People with alcoholism are at a much greater risk of malnutrition than are other people and usually exhibit low levels of most vitamins (especially folic acid). This is because alcohol often takes the place of 50% of their daily intake of calories, with little nutritional value contained in it.

Did you know?

Fungal nail infections account for up to 30% of all skin infections. They affect 5% of the general population—mostly people over the age of 70.

Did you know?

After 5 years of being diagnosed with rheumatoid arthritis, one every three patients will no longer be able to work.

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

Did you know?

It is difficult to obtain enough calcium without consuming milk or other dairy foods.

For a complete list of videos, visit our video library