Which of the following is assured by the use of a hash?
A.
Authentication
B.
Confidentiality
C.
Availability
D.
Integrity
The Answer Is:
D
This question includes an explanation.
Explanation:
A cryptographic hash function is used to ensure data integrity. It generates a fixed-length output (digest) from any size of input data. If the data is modified in any way, the resulting hash will change. This allows systems to detect data tampering, ensuring that the data remains unaltered from its original form.
Reference – CEH v13 Official Study Guide:
Module 20: Cryptography
Quote:
“Hash functions are used to ensure the integrity of a message or file by producing a unique digest that changes if the data is modified.”
Incorrect Options:
A. Authentication ensures identity, not data integrity.
B. Confidentiality is achieved via encryption, not hashing.
C. Availability pertains to system uptime and accessibility, not hashes.
=
312-50v13 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"