header bg

Scan QR code or get instant email to install app

Question:

Confidentiality, integrity, and availability are all security components. Which technique ensures integrity?

A Hashing
explanation

A hash is a one-of-a-kind numerical string generated by a hashing algorithm on a given piece of data and used to verify data integrity. Hashes are commonly used to verify the integrity of files after download (compared to the hash value on the site before download) and/or to accumulate password values. A one-way algorithm generates hashes.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*