Isaca Certified Information Systems Auditor CISA Question # 185 Topic 19 Discussion

Isaca Certified Information Systems Auditor CISA Question # 185 Topic 19 Discussion

CISA Exam Topic 19 Question 185 Discussion:
Question #: 185
Topic #: 19

To confirm integrity for a hashed message, the receiver should use:


A.

the same hashing algorithm as the sender's to create a binary image of the file.


B.

a different hashing algorithm from the sender's to create a binary image of the file.


C.

the same hashing algorithm as the sender's to create a numerical representation of the file.


D.

a different hashing algorithm from the sender's to create a numerical representation of the file.


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.