List of questions
Related questions
Question 80 - CISA discussion
To confirm integrity for a hashed message, the receiver should use:
A.
the same hashing algorithm as the sender's to create a binary image of the file.
B.
a different hashing algorithm from the sender's to create a binary image of the file.
C.
the same hashing algorithm as the sender's to create a numerical representation of the file.
D.
a different hashing algorithm from the sender's to create a numerical representation of the file.
Your answer:
0 comments
Sorted by
Leave a comment first