adplus-dvertising
frame-decoration

Question

The RSA signature uses which hash algorithm?

a.

MD5

b.

SHA-1

c.

MD5 and SHA-1

d.

None of the mentioned.

Answer: (c).MD5 and SHA-1

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The RSA signature uses which hash algorithm?

Similar Questions

Discover Related MCQs

Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

Q. The certificate_request massage includes two parameters, one of which is-

Q. The client_key_exchange message uses a pre master key of size –

Q. In the handshake protocol which is the message type first sent between client and server ?

Q. In the SSLv3 the padding bits are ____________ with the secret key.

Q. Which of the following is not a valid input to the PRF in SSLv3?

Q. Which of the following alert codes is not supported by SSLv3?

Q. We encounter the record_overflow error when the payload length exceeds –

Q. Which key exchange technique is not supported by SSLv3?

Q. Calculation of the certificate_verify in TLS involves the use of a finished_label. The finished_label is the string-

Q. In TLS padding cann be upto a maximum of –

Q. URL stands for –

Q. HTTPS stands for Hypertext Transfer Protocol over TLS.

Q. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL.

Q. Which of the following is not a secure shell protocol?

Q. Which is the lowest level in the SSH protocol stack?

Q. How many trust models does the RFC 4251 dictate?

Q. Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?

Q. The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –

Q. Size of the sequence number is-