Author Question: Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) ... (Read 103 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
 
  What will be an ideal response?

Question 2

Memory management, access to I/O devices, file management, and hardware configuration are all examples of:
 
  A)
 
  Application security
  B)
 
  Operating systems security
  C)
 
  Network security
  D)
 
  Middleware and Web services security
  E)
 
  None of the above



Amiracle

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

SHA-2

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Astigmatism is the most common vision problem. It may accompany nearsightedness or farsightedness. It is usually caused by an irregularly shaped cornea, but sometimes it is the result of an irregularly shaped lens. Either type can be corrected by eyeglasses, contact lenses, or refractive surgery.

Did you know?

Coca-Cola originally used coca leaves and caffeine from the African kola nut. It was advertised as a therapeutic agent and "pickerupper." Eventually, its formulation was changed, and the coca leaves were removed because of the effects of regulation on cocaine-related products.

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

On average, the stomach produces 2 L of hydrochloric acid per day.

Did you know?

After 5 years of being diagnosed with rheumatoid arthritis, one every three patients will no longer be able to work.

For a complete list of videos, visit our video library