Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Which of the following is an asymmetric algorithm that was first publically described in 1977?
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.