Certified Ethical Hacker – CEH – 312-50 – Question314

Which of the following is assured by the use of a hash?


A.
Integrity
B. Confidentiality
C. Authentication
D. Availability

Correct Answer: A

Explanation:

An important application of secure hashes is verification of message integrity. Determining whether any changes have been made to a message (or a file), for example, can be accomplished by comparing message digests calculated before, and after, transmission (or any other event).

References: https://en.wikipedia.org/wiki/Cryptographic_hash_function#Verifying_the_integrity_of_files_or_messages