ISC² Post Assessment 2025 – 400 Free Practice Questions to Pass the Exam

Question: 1 / 400

What technique could be used to ensure a message has not been modified during transit?

Hashing

Hashing is a technique that generates a fixed-size string of characters (a hash value) from input data of any size. This hash value serves as a unique fingerprint for the data. When a message is sent, it can be hashed, and the hash value is sent along with the message. Upon receipt, the recipient can independently hash the received message and compare the newly generated hash value with the one that was sent. If both hash values match, it indicates that the message has not been modified during transit, as even a tiny change in the original data would produce a significantly different hash value.

The other techniques do not primarily focus on ensuring data integrity in transit the way hashing does. Symmetric and asymmetric encryption are used to ensure confidentiality by encoding data so that only authorized parties can read it. While encryption can protect against unauthorized access, it does not provide a direct method for verifying if the data has been altered. Clockwise rotation is not a recognized method in the context of data integrity or security and does not apply in this scenario.

Get further explanation with Examzify DeepDiveBeta

Clockwise rotation

Symmetric encryption

Asymmetric encryption

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy