what size of hash value?
MD2 produces what size of hash value?
what is this called?
When a sender cannot deny sending a message to the receiver, what is this called?
Which of the following was developed by Visa and MasterCard as a way of securing credit card transactions?
Which of the following was developed by Visa and MasterCard as a way of securing credit card transactions?
What is it called when an algorithm produces the same hash values for two different messages?
What is it called when an algorithm produces the same hash values for two different messages?
What is not true of asymmetric cryptography?
What is not true of asymmetric cryptography?
Which statement is true about stream ciphers?
Which statement is true about stream ciphers?
Which is not true of PGP?
Which is not true of PGP?
The act of hiding data within another medium is called:
The act of hiding data within another medium is called:
The standard used for encrypting and digitally signing e-mail that contains attachments is called:
The standard used for encrypting and digitally signing e-mail that contains attachments is called:
Which of the following asymmetric algorithms is used often in Web browsers with SSL?
Which of the following asymmetric algorithms is used often in Web browsers with SSL?
