exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 343 discussion

Actual exam question from CompTIA's SY0-701
Question #: 343
Topic #: 1
[All SY0-701 Questions]

For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor’s website?

  • A. To test the integrity of the file
  • B. To validate the authenticity of the file
  • C. To activate the license for the file
  • D. To calculate the checksum of the file
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
9149f41
2 months ago
Selected Answer: A
3DES (Triple DES) stands for Triple Data Encryption Standard It's an encryption algorithm that: Takes the original DES (Data Encryption Standard) algorithm Applies it three times to each data block Uses three different keys in sequence: Encrypt with Key 1 Decrypt with Key 2 Encrypt with Key 3 Key characteristics: Block size: 64 bits Key size: 168 bits (three 56-bit keys) More secure than single DES Slower than newer algorithms like AES Still used in some legacy systems While 3DES is more secure than single DES, it's generally considered obsolete for new applications, with AES (Advanced Encryption Standard) being the preferred modern encryption standard. 3DES (Triple DES) is actually an encryption algorithm, not a hashing algorithm.
upvoted 2 times
ijia_Ai0823
2 months ago
Agree with this one, 3DES is a symmetric encryption algorithm, and it's different from hashing.
upvoted 1 times
...
...
0ca8ee9
3 months, 3 weeks ago
Selected Answer: A
A systems administrator would leverage a 3DES hash from an installer file posted on a vendor's website primarily to verify the integrity of the file.
upvoted 1 times
...
Fourgehan
4 months ago
Selected Answer: A
A 3DES hash (or more accurately, a cryptographic hash such as MD5, SHA-1, or SHA-256) provided by the vendor is used to verify that the downloaded file has not been altered or corrupted during the download process. Integrity: The hash ensures the file's content is intact. When you calculate the hash of the downloaded file and compare it to the one provided by the vendor, matching values indicate the file has not been tampered with or corrupted
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago