Exam SY0-601 All QuestionsBrowse all questions from this exam
Question 809

Which of the following is an algorithm performed to verify that data has not been modified?

    Correct Answer: D

    A checksum is a value calculated from a data set which is used to verify that the data has not been altered. Unlike hashes or encryption, which serve other additional purposes such as security or confidentiality, checksums are specifically designed for error detection and ensuring data integrity. While both hashing and checksums can be used to check data integrity, the term 'algorithm performed to verify data' more directly indicates the process of calculating a checksum.

Discussion
1403ad2Option: A

choose A 2024-20-2 On Test and passed with 802

ganymedeOption: A

A. Hash Both hash and checksum can validate integrity. But hashing algorithms are better.

Paula77Option: D

A checksum is calculated from a block of digital data with the scope of being used in error detection. Its main function is to detect errors which may have been introduced during its transmission or storage.

slapsterOption: A

I think the semantics of the question are the key here. It is by no coincidence that both hash and checksum are answer choices. At first, I read the question and thought, wth both a checksum and hash value are used to establish integrity. Why am I even being asked to differentiate between the two?? Upon re-reading the question, it clicked that we are being asked to identify an ALGORITHM that establishes the integrity. A checksum is simply the output of an algorithm, therefore hash seems to be the best answer here.

CaNe2o1Option: A

Checksum: While checksums are used to detect errors in data transmission or storage, they are not as robust as hash functions for verifying data integrity. Checksums can detect errors, but they are not designed to verify that data has not been modified intentionally.

agfencerOption: A

A. Hash functions are designed to detect changes in data. If the data is modified, even slightly, the hash value will change significantly, indicating that the data has been altered. WHY NOT CHECKSUM> While checksums can detect changes, they are generally simpler and less secure compared to cryptographic hash functions. Checksums are used for error-checking but may not be as reliable as hashes for verifying data integrity due to their susceptibility to collisions and less robust algorithms.

_deleteme_Option: A

Per Dion Study Guide 601 pg124, using a hash algorithm creates a level of assurance to the integrity and authenticity of given message or file.

ID77Option: A

Hashes are used to verify that data is not modified, tampered with, or corrupted. Hashes are more longer numbers and used in strong cryptographic implementations. Checksum is a small piece of data used to quickly verify the integrity of the data.

chizzuckOption: A

a Hash. A checksum is weaker than a hash and should not replace a hash

russianOption: A

you check the hash to verify that its the same as before

NetworkTester1235Option: D

Checksums provide integrity

russianOption: A

You compare hashes to verify

MortG7Option: A

A Checksum is the outcome of running an algorithm, called a cryptographic hash function.

BD69Option: A

For starters, checksums can have collisions (lots of them). Because of this, checksums are the worst choice for verifying that data has not been modified and certainly offers no guarantee. Cryptographic hashes like MD5 or better are designed to be collision resistant.

KC1008Option: D

Checksum

ekielOption: D

D . Checksum verifies or checks the integrity of data

qwes333Option: D

It's D. Checksum Checksum -> verify the integrity Hash -> protect against X

qwes333

Verify the integrity = ensure that data is not changed Also check on Chapple study guide