Author Question: Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) ... (Read 112 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
 
  What will be an ideal response?

Question 2

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:
 
  A)
 
  Application security
  B)
 
  Operating systems security
  C)
 
  Network security
  D)
 
  Middleware and Web services security
  E)
 
  None of the above



Amiracle

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

SHA-2

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Autoimmune diseases occur when the immune system destroys its own healthy tissues. When this occurs, white blood cells cannot distinguish between pathogens and normal cells.

Did you know?

According to animal studies, the typical American diet is damaging to the liver and may result in allergies, low energy, digestive problems, and a lack of ability to detoxify harmful substances.

Did you know?

Hyperthyroidism leads to an increased rate of metabolism and affects about 1% of women but only 0.1% of men. For most people, this increased metabolic rate causes the thyroid gland to become enlarged (known as a goiter).

Did you know?

Pubic lice (crabs) are usually spread through sexual contact. You cannot catch them by using a public toilet.

Did you know?

The lipid bilayer is made of phospholipids. They are arranged in a double layer because one of their ends is attracted to water while the other is repelled by water.

For a complete list of videos, visit our video library