Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 11 5 pts Which of the following is not a cryptographic hash function? SpookyHash SHA-256 BLAKE2 MD5 Question 12 5 pts Which of the
Question 11 5 pts Which of the following is not a cryptographic hash function? SpookyHash SHA-256 BLAKE2 MD5 Question 12 5 pts Which of the following is true about the one-way property of a hash function? o It provides data integrity protection o It allows the hash function to be used as an encryption function O The longer the resulting hash value, the harder it is to recover the input O It allows a one-to-one mapping of an input to its hash value Question 13 5 pts Which of the following does NOT involve the usage of cryptography? Logging into an internet banking account None of the listed choices Cryptocurrency wallet used to create cryptocurrency transactions O Mining for bitcoin Question 14 5 pts The Message Authentication Code (MAC) uses hash function and a shared secret key between two users in a communication. It aims to: O Provide data confidentiality and user accountability Provide data authentication only O Provide message integrity protection only O Provide message integrity protection and data authentication Question 15 5 pts The SingHealth hack in 2018 that leaked personal information of 1.5m SingHealth patients is a breach of: O Data confidentiality Data authentication User accountability O Data integrity
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started