To confirm integrity for a hashed message, the receiver should use:

To confirm integrity for a hashed message, the receiver should use:
A . the same hashing algorithm as the sender’s to create a binary image of the file.
B. a different hashing algorithm from the sender’s to create a binary image of the file.
C. the same hashing algorithm as the sender’s to create a numerical representation of the file.
D. a different hashing algorithm from the sender’s to create a numerical representation of the file.

Answer: A

Latest CISA Dumps Valid Version with 2694 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments