ExamGecko
Question list
Search
Search

Related questions

Question 80 - CISA discussion

Report
Export

To confirm integrity for a hashed message, the receiver should use:

A.
the same hashing algorithm as the sender's to create a binary image of the file.
Answers
A.
the same hashing algorithm as the sender's to create a binary image of the file.
B.
a different hashing algorithm from the sender's to create a binary image of the file.
Answers
B.
a different hashing algorithm from the sender's to create a binary image of the file.
C.
the same hashing algorithm as the sender's to create a numerical representation of the file.
Answers
C.
the same hashing algorithm as the sender's to create a numerical representation of the file.
D.
a different hashing algorithm from the sender's to create a numerical representation of the file.
Answers
D.
a different hashing algorithm from the sender's to create a numerical representation of the file.
Suggested answer: A

Explanation:

To confirm integrity for a hashed message, the receiver should use the same hashing algorithm as the sender's to create a binary image of the file. A hashing algorithm is a mathematical function that transforms an input data into a fixed-length output value, called a hash or a digest. A hashing algorithm has two main properties: it is one-way, meaning that it is easy to compute the hash from the input, but hard to recover the input from the hash; and it is collision-resistant, meaning that it is very unlikely to find two different inputs that produce the same hash. These properties make hashing algorithms useful for verifying the integrity of data, as any change in the input data will result in a different hash value. Therefore, to confirm integrity for a hashed message, the receiver should use the same hashing algorithm as the sender's to create a binary image of the file, which is a representation of the file in bits (0s and 1s). The receiver should then compare this binary image with the hash value sent by the sender. If they match, then the message has not been altered in transit. If they do not match, then the message has been corrupted or tampered with.

Ensuring Data Integrity with Hash Codes

Message Integrity

asked 18/09/2024
Bart Sandifort
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first