Final answer:
Integrity checkers use a unique digital fingerprint called a hash value to determine if a file has been modified. They do so by comparing the initial trusted hash value of the file with the current hash value during the time of verification.b so, option a is the correct answer.
Step-by-step explanation:
Integrity checkers verify if a file has been modified by using a unique digital fingerprint called the hash value. A hash function takes an input (or 'message') and returns a fixed-size string of bytes, typically a digest that is unique to each unique input. The integrity checker calculates a file's hash value when it is in a trusted state and then recalculates and compares it at the time of verification. If the hash values match, the file has not been changed; if they differ, the file has likely been altered in some way.
Integrity checkers verify if a file has been modified by using a unique digital fingerprint called the hash value. The hash value is calculated based on the contents of an individual file. It is a mathematical algorithm that takes the file's data and produces a fixed-length string of characters. When the file is modified, even by a single bit, the resulting hash value will be different from the original one, indicating that the file has been modified.