Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 7 discussion

Actual exam question from Isaca's CISA
Question #: 7
Topic #: 1
[All CISA Questions]

To confirm integrity for a hashed message, the receiver should use:

  • A. the same hashing algorithm as the sender's to create a binary image of the file.
  • B. a different hashing algorithm from the sender's to create a numerical representation of the file.
  • C. a different hashing algorithm from the sender's to create a binary image of the file.
  • D. the same hashing algorithm as the sender's to create a numerical representation of the file.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
AWS56
Highly Voted 2 years, 2 months ago
Selected Answer: A
To preserve the integrity of a message, the message is passed through an algorithm called a cryptographic hash function. The function creates a compressed image of the message, called a digest. To check the integrity of a message, the receiver runs the cryptographic hash function again and compares the new digest with the previous one.====>Underline Integrity and digest which is an image If both are the same, the receiver is sure that the original message has not been changed. To ensure message integrity and message origin authentication, Message Authentication Code (MAC) is created using a combination of hash function and secret key. A sender sends the message and the MAC to a receiver over the insecure channel. The receiver separates the message from the MAC. He then makes a new MAC from the message and the secret key. Bob then compares the newly created MAC with the one received. If the two MACs match, the message is authentic and has not been modified by an adversary.
upvoted 7 times
...
MichaelHoang
Highly Voted 1 year, 10 months ago
Selected Answer: D
the only different between A and D is what value is generated after hashing of message. Normally, to check integrity, hash will be created by receiver using the same algorithm used by sender. The result of hashing will be numerical then we can compare with the original numerical generated by sender to ensure the integrity of the file. Then, I chose D
upvoted 5 times
...
scriptkiddie
Most Recent 4 months ago
Selected Answer: D
A hash ensures the integrity of a message; if the hash value differs from the expected one, it implies the message has been altered​​.
upvoted 1 times
...
Swallows
4 months, 1 week ago
Selected Answer: A
"binary image" is more specific to the context of the actual data being hashed.
upvoted 1 times
...
B1990
4 months, 3 weeks ago
To confirm integrity for a hashed message, the receiver should use: A. the same hashing algorithm as the sender's to create a binary image of the file. Using the same hashing algorithm as the sender ensures that the receiver performs the same hashing process on the received message or file. This allows the receiver to generate a binary image or hash value identical to the one initially created by the sender. By comparing the generated hash value with the original hash value shared by the sender, the receiver can confirm whether the message or file has remained intact and has not been tampered with during transmission.
upvoted 1 times
...
poopsmcgoops
4 months, 3 weeks ago
A is wrong because you're not trying to create a binary image of the file (raw data essentially), you want to compute a hash so you can compare hashes between the computers to ensure that no data has been lost or changed, thus the answer is D.
upvoted 2 times
...
thusharaj
5 months, 1 week ago
A hash value is essentially a unique identifier for a set of data, like a digital fingerprint for files. When a file’s contents are processed through a cryptographic algorithm, it produces a hash value—a unique numerical value that represents the contents of the file. This value is not an image of the file but rather a fixed-size string of characters that may include numbers and letters. The hash value changes significantly if the contents of the file are altered in any way, making it a reliable method for verifying data integrity. So, the answer is D.
upvoted 1 times
...
a84n
6 months, 4 weeks ago
Selected Answer: D
Answer: D
upvoted 2 times
...
5b56aae
7 months, 1 week ago
Selected Answer: D
only D makes sense
upvoted 2 times
...
Vima234
8 months, 3 weeks ago
A is the correct one
upvoted 1 times
...
oldmagic
1 year, 4 months ago
Selected Answer: A
A is the correct answer here
upvoted 2 times
...
TTH1019
1 year, 5 months ago
A is the right answer
upvoted 1 times
...
frisbg
1 year, 6 months ago
Selected Answer: A
Doesnt need to be numerical, can be hexadecimal so abcdef is also included (Eg. md5). From this perspective answer is A, as its all same when binary represented
upvoted 2 times
...
NDUBU
1 year, 6 months ago
C. a different hashing algorithm from the sender's to create a binary image of the file. When verifying the integrity of a hashed message, the receiver should use a different hashing algorithm from the sender's to create a binary image of the file. This is done to ensure that the integrity check is valid and that the message has not been tampered with during transmission. Using the same hashing algorithm as the sender to create a numerical representation of the file is not sufficient to confirm integrity because the hash value could have been altered during transmission.
upvoted 1 times
ChaBum
9 months ago
Using different hashing algorithm, will in all cases give two different binary images, so from there, how do you check the message has not been tampered with?
upvoted 2 times
...
...
babadook13
1 year, 10 months ago
Selected Answer: D
For me it's D
upvoted 2 times
...
Julianleehk
2 years, 1 month ago
A should be the one
upvoted 2 times
...
Davolee
2 years, 2 months ago
Selected Answer: D
https://www.101computing.net/hashing-algorithms-for-integrity-validation/
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...