exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 236 discussion

Actual exam question from CompTIA's SY0-701
Question #: 236
Topic #: 1
[All SY0-701 Questions]

A company wants to ensure that the software it develops will not be tampered with after the final version is completed. Which of the following should the company most likely use?

  • A. Hashing
  • B. Encryption
  • C. Baselines
  • D. Tokenization
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
laternak26
4 weeks, 1 day ago
Selected Answer: A
A. Hashing: Hashing is a technique used to generate a unique, fixed-size value (hash) based on the contents of a file, such as a software application. After the final version of the software is completed, the company can create a hash of the software file and store it securely. Whenever the software is accessed or distributed, the company can recalculate the hash and compare it to the original hash. If the hashes match, the file has not been tampered with. This provides a way to verify the integrity of the software and ensure that it has not been altered after the final version. Why not C. Baselines: Baselines refer to a set of standards or configurations for systems and software that are considered secure. While baselines can be useful for ensuring that systems meet security standards, they do not directly address ensuring that the software has not been tampered with after it is finalized. Baselines help with ongoing security practices rather than tamper detection.
upvoted 1 times
...
3b1fd98
1 month, 1 week ago
Selected Answer: C
C. Baselines refer to a reference point or a final version of a system or software that is used as a standard for comparison. Once a baseline is established, any changes to the software can be detected by comparing it against the baseline version. This is crucial for ensuring that the software has not been tampered with after the final version is completed. The baseline provides a known and trusted version of the software, making it easier to spot any unauthorized modifications or tampering.
upvoted 1 times
...
jafyyy
4 months, 3 weeks ago
A Hashing ensures integrity of software by detecting any unauthorized changes or tampering after its final version.
upvoted 2 times
...
qacollin
5 months ago
Selected Answer: A
A. GPT
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago