Answer:
A. True
Step-by-step explanation:
Most of the attacks on hash functions are based on finding collisions (so 2 different plain texts will match the same hash) or pre-generating millions of hashes and comparing them until you find the plain that generated it.
If a hash algorithm is reverse-engineerable or can be attacked that way, it's not a good hash algorithm.