Question

Which of the following is NOT true of hashes? a. You cannot reverse engineer a hash...

Which of the following is NOT true of hashes?

a.

You cannot reverse engineer a hash to derive the input data

b.

It uses a fixed size string, so even if a hard drive is hashed, the hash will be the same number of bits as just a hashed text file.

c.

Its primary security service is confidentiality

d.

You cannot decrypt a hash

Homework Answers

Answer #1

ANSWER - (c) Primary security service is confidentiality

Hash is one of the property that can converts one value to another also it can generate address in table.

  • Decryption in a hash is not possible because hash is a one way function.
  • It is practically impossible reverse engineer a hash to derive the input data
  • In Hashes even hard drive is hashed, the hash will be the same number of bits.

So, all these above statements are true.

Hash primary security service is integrity not confidentiality.

So, the correct option is (c).

=================================END================================

Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
IN JAVA!! You may be working with a programming language that has arrays, but not nodes....
IN JAVA!! You may be working with a programming language that has arrays, but not nodes. In this case you will need to save your BST in a two dimensional array. In this lab you will write a program to create a BST modelled as a two-dimensional array. The output from your program will be a two-dimensional array.   THEN: practice creating another array-based BST using integers of your choice. Once you have figured out your algorithm you will be able...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
“Unilateral contracts” are those in which only one side gives consideration to the other. True/False Privately...
“Unilateral contracts” are those in which only one side gives consideration to the other. True/False Privately owned businesses generally do not have to respect Constitutional rights of employees, because the Bill of Rights was designed just to protect people from actions of Government – not from actions of private parties like private businesses. True or False 3. True or False  “Chapter 7” bankruptcy petitions (sometimes referred to as “total liquidation”) are always filed voluntarily, by the debtor. The debtor cannot be...
In which order the following ‘arguments’ of the foo() function will be put on the stack...
In which order the following ‘arguments’ of the foo() function will be put on the stack (the left-most variable has the highest memory address and the right-most variable has the lowest memory address)? void foo(int d, int s, string x, int e) d, s, x, e. e, x, s, d. x, d, s, e. d, s, e, x. To execute an external command from inside a program, either of the ‘system()’ or ‘execve()’ functions can be used. Select ALL of...
For a C program hangman game: Create the function int setup_game [int setup_game ( Game *g,...
For a C program hangman game: Create the function int setup_game [int setup_game ( Game *g, char wordlist[][MAX_WORD_LENGTH], int numwords)] for a C program hangman game. (The existing code for other functions and the program is below, along with what the function needs to do) What int setup_game needs to do setup_game() does exactly what the name suggests. It sets up a new game of hangman. This means that it picks a random word from the supplied wordlist array and...
Question 1 of 15 Which of the following is not a recommended starting point to enter...
Question 1 of 15 Which of the following is not a recommended starting point to enter sales of products/services? A. Quick Create > Invoice B. Register > New transaction C. Quick Create > Sales Receipt D. Customer detail page > New transaction E. Transactions > Sales > New transaction Question 2 of 15 Which of the following statements accurately describes bank rules? A. Bank rules are imported from the Bank's website into the For Review tab in the Banking Center...
After reading the following article, how would you summarize it? What conclusions can be made about...
After reading the following article, how would you summarize it? What conclusions can be made about Amazon? Case 12: Amazon.com Inc.: Retailing Giant to High-Tech Player? (Internet Companies) Overview Founded by Jeff Bezos, online giant Amazon.com, Inc. (Amazon), was incorporated in the state of Washington in July 1994, and sold its first book in July 1995. In May 1997, Amazon (AMZN) completed its initial public offering and its common stock was listed on the NASDAQ Global Select Market. Amazon quickly...
Tax Return Project James A. Varney and Denise M. Varney James and Denise Varney are married...
Tax Return Project James A. Varney and Denise M. Varney James and Denise Varney are married and file a joint return. James is 48 years of age and Denise is 49. James is employed full-time as an electrical engineer for Livingston Unitech Corporation, Ltd. Denise is a self-employed design consultant. They have two children, Pamela and Vernon, who live at home and receive all of their support from their parents. Pamela is 20 years old and attended college on a...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT