Publishing files' hashes is a common practice used to validate the integrity of files and ensure that they have not been tampered with or corrupted. A hash value is a unique fixed-size string of characters generated from the contents of a file using a cryptographic hashing algorithm. Even a minor change in the file's content will result in a completely different hash value.
When files are distributed, users can independently calculate the hash value of the received file and compare it to the published hash value. If the calculated hash matches the published hash, it means that the file has not been altered during transit, ensuring its integrity. If the hash values do not match, it indicates that the file may have been tampered with, corrupted, or modified, and users should exercise caution before using the file.
Publishing files' hashes is primarily done to validate the integrity of the files. Hash functions generate unique hash values based on the content of a file. By calculating and publishing the hash values for files, users can compare them to verify the integrity of the files they possess.
When a file is downloaded or received from an untrusted source, comparing the calculated hash of the file with the published hash allows users to determine if the file has been altered or tampered with during transmission. If the calculated hash matches the published hash, it indicates that the file has not been modified and remains intact.
I believe it's 'B'. Software vendors publish the hashes of their software products so the end users (in case they downloaded the software from 3rd-party websites) can verify if the software has not been tampered with (added malware or malicious code). Digital signatures use hashes.
But a hash does not prove that it was digitally signed. You take a plain txt file and, using a hash generator, create a hash for it. If I then share the text file with you and you wanted to make sure what is currently in the text file is the same as what I sent you then you'd use a compatible hash generator to generate a hash for the file you received. If our hashes match then the file wasn't changed. If the hash is different then something happened in transit and you can't trust that txt file. To accomplish this I didn't have to digitally sign it or encrypt it or anything. Just share the file with you along with my original hash.
To validate the integrity of the files - Hash function algorithms compares the file's original and current hash values. And if a byte or even a piece of the file's data has been changed, the original and current hash values will be different, and therefore you will know whether it's the same file or not.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
securityexam101
Highly Voted 2 years, 9 months agovarun0
Highly Voted 2 years, 10 months agosubaie503
Most Recent 1 year, 4 months agoDChilds
1 year, 8 months agoProtract8593
1 year, 11 months agoApplebeesWaiter1122
2 years agoDALLASCOWBOYS
2 years, 5 months agoGetBuckets
2 years, 6 months agoTinyTrexArmz
2 years, 5 months agorodwave
2 years, 7 months agolordguck
2 years, 8 months agoRibeiro19
2 years, 10 months agostoneface
2 years, 10 months agocomeragh
2 years, 10 months ago