Respuesta :

Answer:

A. True

Explanation:

Most of the attacks on hash functions are based on finding collisions (so 2 different plain texts will match the same hash) or pre-generating millions of hashes and comparing them until you find the plain that generated it.

If a hash algorithm is reverse-engineerable or can be attacked that way, it's not a good hash algorithm.