Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Of the following choices, what can you use to verify data integrity?
DES (Data Encryption Standard)
AES (Advanced Encryption Standard)
SHA (Secure Hash Algorithm)
RC4 (Rivest Cipher 4)
Secure Hash Algorithm (SHA) is one of many available hashing algorithms used to verify data integrity. The other options are not hashing algorithms, but symmetric encryption algorithms. [EDIT] SHA is just an acronym. SHA-1 is a specific hash function (that you should not use as it is not secure by modern standards), SHA-2 is a family of hash functions (SHA-256, -384, -512, ...), and similarly for the SHA-3 family.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.