110k views
2 votes
How do integrity checkers verify if a file has been modified? Integrity checkers scan computer drives to check if any data has been modified. They use the concept of a unique digital fingerprint called the BLANK, which it calculates based on the contents of an individual file.

Fill in the blank with the appropriate term:

(a) Hash value
(b) Binary code
(c) Encryption key
(d) Compression algorithm

User Joshualan
by
7.4k points

1 Answer

4 votes

Final answer:

Integrity checkers use a unique digital fingerprint called a hash value to determine if a file has been modified. They do so by comparing the initial trusted hash value of the file with the current hash value during the time of verification.b so, option a is the correct answer.

Step-by-step explanation:

Integrity checkers verify if a file has been modified by using a unique digital fingerprint called the hash value. A hash function takes an input (or 'message') and returns a fixed-size string of bytes, typically a digest that is unique to each unique input. The integrity checker calculates a file's hash value when it is in a trusted state and then recalculates and compares it at the time of verification. If the hash values match, the file has not been changed; if they differ, the file has likely been altered in some way.

Integrity checkers verify if a file has been modified by using a unique digital fingerprint called the hash value. The hash value is calculated based on the contents of an individual file. It is a mathematical algorithm that takes the file's data and produces a fixed-length string of characters. When the file is modified, even by a single bit, the resulting hash value will be different from the original one, indicating that the file has been modified.

User Rick Burns
by
6.8k points