Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 809 discussion

Actual exam question from CompTIA's SY0-601
Question #: 809
Topic #: 1
[All SY0-601 Questions]

Which of the following is an algorithm performed to verify that data has not been modified?

  • A. Hash
  • B. Code check
  • C. Encryption
  • D. Checksum
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
1403ad2
Highly Voted 2 months, 1 week ago
choose A 2024-20-2 On Test and passed with 802
upvoted 10 times
...
ganymede
Highly Voted 3 months ago
Selected Answer: A
A. Hash Both hash and checksum can validate integrity. But hashing algorithms are better.
upvoted 5 times
...
NetworkTester1235
Most Recent 1 week, 3 days ago
Selected Answer: D
Checksums provide integrity
upvoted 1 times
...
russian
2 weeks ago
Selected Answer: A
You compare hashes to verify
upvoted 1 times
...
MortG7
3 weeks ago
A Checksum is the outcome of running an algorithm, called a cryptographic hash function.
upvoted 1 times
...
_deleteme_
3 weeks, 1 day ago
Per Dion Study Guide 601 pg124, using a hash algorithm creates a level of assurance to the integrity and authenticity of given message or file.
upvoted 1 times
...
BD69
1 month ago
Selected Answer: A
For starters, checksums can have collisions (lots of them). Because of this, checksums are the worst choice for verifying that data has not been modified and certainly offers no guarantee. Cryptographic hashes like MD5 or better are designed to be collision resistant.
upvoted 1 times
...
KC1008
1 month, 2 weeks ago
Selected Answer: D
Checksum
upvoted 1 times
...
ekiel
1 month, 2 weeks ago
Selected Answer: D
D . Checksum verifies or checks the integrity of data
upvoted 1 times
...
Paula77
1 month, 3 weeks ago
Selected Answer: D
A checksum is calculated from a block of digital data with the scope of being used in error detection. Its main function is to detect errors which may have been introduced during its transmission or storage.
upvoted 4 times
...
ID77
1 month, 4 weeks ago
Selected Answer: A
Hashes are used to verify that data is not modified, tampered with, or corrupted. Hashes are more longer numbers and used in strong cryptographic implementations. Checksum is a small piece of data used to quickly verify the integrity of the data.
upvoted 2 times
...
qwes333
2 months ago
Selected Answer: D
It's D. Checksum Checksum -> verify the integrity Hash -> protect against X
upvoted 1 times
qwes333
2 months ago
Verify the integrity = ensure that data is not changed Also check on Chapple study guide
upvoted 1 times
...
...
slapster
2 months, 1 week ago
Selected Answer: A
I think the semantics of the question are the key here. It is by no coincidence that both hash and checksum are answer choices. At first, I read the question and thought, wth both a checksum and hash value are used to establish integrity. Why am I even being asked to differentiate between the two?? Upon re-reading the question, it clicked that we are being asked to identify an ALGORITHM that establishes the integrity. A checksum is simply the output of an algorithm, therefore hash seems to be the best answer here.
upvoted 3 times
...
CaNe2o1
2 months, 3 weeks ago
Selected Answer: A
Checksum: While checksums are used to detect errors in data transmission or storage, they are not as robust as hash functions for verifying data integrity. Checksums can detect errors, but they are not designed to verify that data has not been modified intentionally.
upvoted 4 times
...
Kartabk
2 months, 4 weeks ago
Selected Answer: A
while both checksums and hash functions are used to verify data integrity, checksums are simpler and less secure, primarily intended for error detection. Hash functions are more complex, resistant to intentional tampering, and suitable for cryptographic applications where data security is crucial.
upvoted 3 times
...
Payu1994
3 months ago
The algorithm performed to verify that data has not been modified is: A. Hash Explanation: Hash (Option A): A hash function takes input data and produces a fixed-size string of characters, which is typically a hexadecimal number. The hash value, or hash code, is unique to the input data. By comparing the hash value of the original data with the hash value calculated from the received or stored data, one can determine whether the data has been modified. If the hash values match, the data is likely unchanged; if they differ, it indicates that the data has been altered.
upvoted 1 times
...
johnabayot
3 months, 1 week ago
Selected Answer: D
D. Checksum
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...