Hashing is the key for integrity here, not encryption. If the question mentioned digital signatures, then maybe RSA could be a contender, but as written it's definitely SHA-256.
Q: 4
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any
unauthorized modifications?
Options
Discussion
B
Hashing is the key for integrity here, not encryption. If the question mentioned digital signatures, then maybe RSA could be a contender, but as written it's definitely SHA-256.
Hashing is the key for integrity here, not encryption. If the question mentioned digital signatures, then maybe RSA could be a contender, but as written it's definitely SHA-256.
It’s B, SHA-256. Hash functions like SHA-256 are made exactly for checking integrity because they generate unique digests. Encryption (like DES or AES) protects confidentiality but doesn't verify if something changed. Pretty sure about this one, but open if anyone disagrees.
Be respectful. No spam.
Question 4 of 30