exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 809 discussion

Actual exam question from CompTIA's SY0-601
Question #: 809
Topic #: 1
[All SY0-601 Questions]

Which of the following is an algorithm performed to verify that data has not been modified?

  • A. Hash
  • B. Code check
  • C. Encryption
  • D. Checksum
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
1403ad2
Highly Voted 1 year, 4 months ago
choose A 2024-20-2 On Test and passed with 802
upvoted 16 times
...
ganymede
Highly Voted 1 year, 5 months ago
Selected Answer: A
A. Hash Both hash and checksum can validate integrity. But hashing algorithms are better.
upvoted 7 times
janeyyyyyy322
11 months, 3 weeks ago
checksum for checking corrupted files. hash for integrity
upvoted 1 times
...
...
chizzuck
Most Recent 12 months ago
Selected Answer: A
a Hash. A checksum is weaker than a hash and should not replace a hash
upvoted 1 times
...
agfencer
1 year ago
Selected Answer: A
A. Hash functions are designed to detect changes in data. If the data is modified, even slightly, the hash value will change significantly, indicating that the data has been altered. WHY NOT CHECKSUM> While checksums can detect changes, they are generally simpler and less secure compared to cryptographic hash functions. Checksums are used for error-checking but may not be as reliable as hashes for verifying data integrity due to their susceptibility to collisions and less robust algorithms.
upvoted 2 times
...
russian
1 year, 2 months ago
Selected Answer: A
you check the hash to verify that its the same as before
upvoted 1 times
...
NetworkTester1235
1 year, 2 months ago
Selected Answer: D
Checksums provide integrity
upvoted 1 times
...
russian
1 year, 2 months ago
Selected Answer: A
You compare hashes to verify
upvoted 1 times
...
MortG7
1 year, 3 months ago
A Checksum is the outcome of running an algorithm, called a cryptographic hash function.
upvoted 1 times
...
_deleteme_
1 year, 3 months ago
Per Dion Study Guide 601 pg124, using a hash algorithm creates a level of assurance to the integrity and authenticity of given message or file.
upvoted 2 times
...
BD69
1 year, 3 months ago
Selected Answer: A
For starters, checksums can have collisions (lots of them). Because of this, checksums are the worst choice for verifying that data has not been modified and certainly offers no guarantee. Cryptographic hashes like MD5 or better are designed to be collision resistant.
upvoted 1 times
...
KC1008
1 year, 4 months ago
Selected Answer: D
Checksum
upvoted 1 times
...
ekiel
1 year, 4 months ago
Selected Answer: D
D . Checksum verifies or checks the integrity of data
upvoted 1 times
...
Paula77
1 year, 4 months ago
Selected Answer: D
A checksum is calculated from a block of digital data with the scope of being used in error detection. Its main function is to detect errors which may have been introduced during its transmission or storage.
upvoted 4 times
...
ID77
1 year, 4 months ago
Selected Answer: A
Hashes are used to verify that data is not modified, tampered with, or corrupted. Hashes are more longer numbers and used in strong cryptographic implementations. Checksum is a small piece of data used to quickly verify the integrity of the data.
upvoted 2 times
...
qwes333
1 year, 4 months ago
Selected Answer: D
It's D. Checksum Checksum -> verify the integrity Hash -> protect against X
upvoted 1 times
qwes333
1 year, 4 months ago
Verify the integrity = ensure that data is not changed Also check on Chapple study guide
upvoted 1 times
...
...
slapster
1 year, 4 months ago
Selected Answer: A
I think the semantics of the question are the key here. It is by no coincidence that both hash and checksum are answer choices. At first, I read the question and thought, wth both a checksum and hash value are used to establish integrity. Why am I even being asked to differentiate between the two?? Upon re-reading the question, it clicked that we are being asked to identify an ALGORITHM that establishes the integrity. A checksum is simply the output of an algorithm, therefore hash seems to be the best answer here.
upvoted 4 times
...
CaNe2o1
1 year, 5 months ago
Selected Answer: A
Checksum: While checksums are used to detect errors in data transmission or storage, they are not as robust as hash functions for verifying data integrity. Checksums can detect errors, but they are not designed to verify that data has not been modified intentionally.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...