MCQOPTIONS
Saved Bookmarks
| 1. |
What do we call the attack which is made against hash algorithms that are used to verify the integrity of a message, software or digital signature? |
| A. | Birthday attacks |
| B. | Password attacks |
| C. | Session Hijacking |
| D. | MIM attack |
| Answer» B. Password attacks | |