Question 26
How can rainbow tables be defeated?
Question 27
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Question 28
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Question 29
If you XOR 10111000 with 10101010, what is the result?
Question 30
A linear congruential generator is an example of what?