gisselle6186 gisselle6186 29-03-2024 Computers and Technology contestada As with symmetric encryption, there are two approaches to attacking a secur hash function: brute-force attack and ___________ .a. Collision attackb. Rainbow table attackc. Dictionary attackd. Birthday attack