exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 523 discussion

Actual exam question from CompTIA's SY0-701
Question #: 523
Topic #: 1
[All SY0-701 Questions]

Which of the following describes the difference between encryption and hashing?

  • A. Encryption protects data in transit, while hashing protects data at rest.
  • B. Encryption replaces cleartext with ciphertext, while hashing calculates a checksum.
  • C. Encryption ensures data integrity, while hashing ensures data confidentiality.
  • D. Encryption uses a public-key exchange, while hashing uses a private key.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
test_arrow
2 months, 1 week ago
Selected Answer: B
. Encryption replaces cleartext with ciphertext, while hashing calculates a checksum. Explanation: ✔ Encryption converts plaintext into ciphertext using an algorithm and a key, allowing data to be decrypted when needed. ✔ Hashing generates a fixed-length checksum (hash) from input data, ensuring data integrity but not reversibility (i.e., hashes cannot be decrypted). Why not the other options? A. Encryption protects data in transit, while hashing protects data at rest. ❌ Incorrect – Encryption protects both data in transit and at rest, while hashing is used for data integrity verification, not storage security. C. Encryption ensures data integrity, while hashing ensures data confidentiality. ❌ Incorrect – Encryption ensures confidentiality, and hashing ensures integrity, not the other way around. D. Encryption uses a public-key exchange, while hashing uses a private key. ❌ Incorrect – Hashing does not use any keys. Public-key exchange applies only to asymmetric encryption, not encryption as a whole.
upvoted 2 times
...
9149f41
2 months, 3 weeks ago
Selected Answer: B
Encrypted data hackers cannot understand, but hackers can alter the data. That's to say it ensures confidentiality but not integrity. Encryption works with both data in transit and rest. Encryption uses a public key (SSL), a private key (Asymetric), and a symmetric key (AES). But Hash does not need any keys. Just the specific length of the hash.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago