Author Question: Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) ... (Read 65 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
 
  What will be an ideal response?

Question 2

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:
 
  A)
 
  Application security
  B)
 
  Operating systems security
  C)
 
  Network security
  D)
 
  Middleware and Web services security
  E)
 
  None of the above



Amiracle

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

SHA-2

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Only 12 hours after an egg cell is fertilized by a sperm cell, the egg cell starts to divide. As it continues to divide, it moves along the fallopian tube toward the uterus at about 1 inch per day.

Did you know?

The term pharmacology is derived from the Greek words pharmakon("claim, medicine, poison, or remedy") and logos ("study").

Did you know?

Earwax has antimicrobial properties that reduce the viability of bacteria and fungus in the human ear.

Did you know?

The most common childhood diseases include croup, chickenpox, ear infections, flu, pneumonia, ringworm, respiratory syncytial virus, scabies, head lice, and asthma.

Did you know?

Throughout history, plants containing cardiac steroids have been used as heart drugs and as poisons (e.g., in arrows used in combat), emetics, and diuretics.

For a complete list of videos, visit our video library