ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 249 - SY0-701 discussion

Report
Export

Which of the following is an algorithm performed to verify that data has not been modified?

A.
Hash
Answers
A.
Hash
B.
Code check
Answers
B.
Code check
C.
Encryption
Answers
C.
Encryption
D.
Checksum
Answers
D.
Checksum
Suggested answer: A

Explanation:

A hash is an algorithm used to verify data integrity by generating a fixed-size string of characters from input data. If even a single bit of the input data changes, the hash value will change, allowing users to detect any modification to the data. Hashing algorithms like SHA-256 and MD5 are commonly used to ensure data has not been altered.

CompTIA Security+ SY0-701 Course Content: Domain 6: Cryptography and PKI, which discusses the role of hashing in verifying data integrity.

asked 02/10/2024
Mohamed Nacer Ferhi
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first