Multiple Choice
Alice sends Bob a message along with an MD5 hash of the message.Upon receipt,Bob runs the MD5 hashing algorithm and finds that the hash matches the one sent by Alice.This application of encryption is an example of
A) Authentication
B) Nonrepudiation
C) Integrity
D) Confidentiality
Correct Answer:

Verified
Correct Answer:
Verified
Q26: A(n)_ is a special mathematical function that
Q27: Cryptography is the process of attempting to
Q28: A special mathematical function that performs one-way
Q29: What is steganography and what danger does
Q30: Cryptography can be used to protect confidentiality
Q32: The encryption method base on the idea
Q33: Alice sends an e-mail that she encrypts
Q34: _ is done by comparing the input
Q35: Agents intercept a message that is encrypted.They
Q36: What are some of the uses of