Cryptography Network Security Compilers Computer Graphics Computer Network Computer Organization Architecture Database Management System Discrete Mathematics Embedded System Microcontroller Microprocessors Electronics & Electrical MCQs Arduino Antennas Analog Circuits ...
We know that the hash function providing message authentication is referred to as massage digest in cryptography.3) Which of the following are used to create a message digest by the network security protocols?RSA SHA-1 DES MD5Answer: b. and c. SHA-1 and MD5...
The section contains multiple choice questions and answers on different aspects of Security. These include security of System Threats, Detection of Intrusions, making systems and facilities secure and the concept of Cryptography used for Security. Security – Program and System Threats Security – Securi...