CISA Certified Information Systems Auditor – Question2121

To confirm integrity for a hashed message, the receiver should use:

A.
a different hashing algorithm from the sender’s to create a numerical representation of the file.
B. a different hashing algorithm from the sender’s to create a binary image of the file.
C. the same hashing algorithm as the sender’s to create a binary image of the file.
D. the same hashing algorithm as the sender’s to create a numerical representation of the file.

Correct Answer: D