Author Question: Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) ... (Read 117 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
 
  What will be an ideal response?

Question 2

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:
 
  A)
 
  Application security
  B)
 
  Operating systems security
  C)
 
  Network security
  D)
 
  Middleware and Web services security
  E)
 
  None of the above



Amiracle

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

SHA-2

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

If all the neurons in the human body were lined up, they would stretch more than 600 miles.

Did you know?

In inpatient settings, adverse drug events account for an estimated one in three of all hospital adverse events. They affect approximately 2 million hospital stays every year, and prolong hospital stays by between one and five days.

Did you know?

Asthma cases in Americans are about 75% higher today than they were in 1980.

Did you know?

The first monoclonal antibodies were made exclusively from mouse cells. Some are now fully human, which means they are likely to be safer and may be more effective than older monoclonal antibodies.

Did you know?

Pope Sylvester II tried to introduce Arabic numbers into Europe between the years 999 and 1003, but their use did not catch on for a few more centuries, and Roman numerals continued to be the primary number system.

For a complete list of videos, visit our video library