1.

What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature?

A. Birthday attacks
B. Password attacks
C. Session Hijacking
D. MIM attack
Answer» B. Password attacks


Discussion

No Comment Found