Multiple Choice
Match each item with a statement below.
-Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
A) asymmetric algorithm
B) DEA
C) symmetric algorithm
D) certificate
E) hashing algorithm
F) birthday attacks
G) stream cipher
H) PKI
I) key
J) salt
Correct Answer:

Verified
Correct Answer:
Verified
Q6: What type of packet filtering records session-specific
Q7: What is a path-vector routing protocol?
Q8: Routers operate at the Network layer of
Q9: When Web site visitors are involved in
Q10: A large organization that is responsible for
Q12: What is Triple Data Encryption Standard (3DES)?
Q13: What is a distance-vector routing protocol?
Q14: What type of function is being performed
Q15: What type of IDS/IPS is used to
Q16: What type of an IDS is being