单项选择题
A.HMAC B.RSA C.MD5 D.SHA-1
Whichexampleisofafunctionintendedforcryptographichashin...
单项选择题Which example is of a function intended for cryptographic hashing?()
A.MD65 B.SHA-135 C.XR12 D.MD5
Whichoneofthefollowingitemsmaybeaddedtoapasswordstoredi...
单项选择题Which one of the following items may be added to a password stored in MD5 to make it more secure?()
A.Ciphertext B.Salt C.Cryptotext D.Rainbow table
Whichitemisthegreatmajorityofsoftwarevulnerabilitiestha...
单项选择题Which item is the great majority of software vulnerabilities that have been discovered?()
A.Stack vulnerabilities B.Heap overflows C.Software overflows D.Buffer overflows