The suggested answer is D.
To confirm the integrity of a hashed message, the receiver must use the same hashing algorithm as the sender to create a numerical representation of the file. The process involves the receiver hashing the received message using the same algorithm, resulting in a hash value. This hash value is then compared to the original hash value generated by the sender. If both hash values match, the integrity of the message is confirmed, verifying that the message has not been altered during transmission. The hash value serves as a unique fingerprint for the message, ensuring data consistency and integrity.