ExamGecko
Question list
Search
Search

Related questions











Question 109 - 212-81 discussion

Report
Export

Which of the following is required for a hash?

A.
Not vulnerable to a brute force attack
Answers
A.
Not vulnerable to a brute force attack
B.
Few collisions
Answers
B.
Few collisions
C.
Must use SALT
Answers
C.
Must use SALT
D.
Not reversible
Answers
D.
Not reversible
E.
Variable length input, fixed length output
Answers
E.
Variable length input, fixed length output
F.
Minimum key length
Answers
F.
Minimum key length
Suggested answer: D, E

Explanation:

Correct answers: Variable length input, fixed length output and Not reversible

https://en.wikipedia.org/wiki/Hash_function

A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes. The values are used to index a fixed-size table called a hash table. Use of a hash function to index a hash table is called hashing or scatter storage addressing.

asked 18/09/2024
Khaled Mohamed Abdraboh Metwalli
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first