

MCQOPTIONS
Saved Bookmarks
1. |
What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature? |
A. | Birthday attacks |
B. | Password attacks |
C. | Session Hijacking |
D. | MIM attack |
Answer» B. Password attacks | |