Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Isaca Certified Information Systems Auditor CISA Question # 173 Topic 18 Discussion

Isaca Certified Information Systems Auditor CISA Question # 173 Topic 18 Discussion

CISA Exam Topic 18 Question 173 Discussion:
Question #: 173
Topic #: 18

To confirm integrity for a hashed message, the receiver should use:


A.

the same hashing algorithm as the sender ' s to create a binary image of the file.


B.

a different hashing algorithm from the sender ' s to create a binary image of the file.


C.

the same hashing algorithm as the sender ' s to create a numerical representation of the file.


D.

a different hashing algorithm from the sender ' s to create a numerical representation of the file.


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.