What technique could be used to ensure a message has not been modified during transit?

Boost your ISC² exam readiness. Answer questions with detailed explanations. Gear up for certification success!

Hashing is a technique that generates a fixed-size string of characters (a hash value) from input data of any size. This hash value serves as a unique fingerprint for the data. When a message is sent, it can be hashed, and the hash value is sent along with the message. Upon receipt, the recipient can independently hash the received message and compare the newly generated hash value with the one that was sent. If both hash values match, it indicates that the message has not been modified during transit, as even a tiny change in the original data would produce a significantly different hash value.

The other techniques do not primarily focus on ensuring data integrity in transit the way hashing does. Symmetric and asymmetric encryption are used to ensure confidentiality by encoding data so that only authorized parties can read it. While encryption can protect against unauthorized access, it does not provide a direct method for verifying if the data has been altered. Clockwise rotation is not a recognized method in the context of data integrity or security and does not apply in this scenario.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy