Examples of hash functions are
(a) MD5
(b) SHA-1
(c) MD5 & SHA-1
(d) None of the mentioned
The question was posed to me in an international level competition.
This interesting question is from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications