To confirm integrity for a hashed message, the receiver should use:
A . the same hashing algorithm as the sender’s to create a binary image of the file.
B. a different hashing algorithm from the sender’s to create a binary image of the file.
C. the same hashing algorithm as the sender’s to create a numerical representation of the file.
D. a different hashing algorithm from the sender’s to create a numerical representation of the file.
Answer: A
Latest CISA Dumps Valid Version with 2694 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund