Valid Cybersecurity-Architecture-and-Engineering Dumps shared by ExamDiscuss.com for Helping Passing Cybersecurity-Architecture-and-Engineering Exam! ExamDiscuss.com now offer the newest Cybersecurity-Architecture-and-Engineering exam dumps, the ExamDiscuss.com Cybersecurity-Architecture-and-Engineering exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Cybersecurity-Architecture-and-Engineering dumps with Test Engine here:
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?
Correct Answer: B
The correct answer is B - Secure Hash Algorithm 256 (SHA-256). WGU Cybersecurity Architecture and Engineering (KFO1 / D488) outlines that SHA-256 is a cryptographic hash function used to verify data integrity. It generates a fixed-size hash value based on input data, and any alteration to the data results in a different hash, signaling tampering. DES (A) and AES (C) are encryption algorithms for confidentiality. RSA (D) is used for encryption and digital signatures, not solely for ensuring integrity via hashing. Reference Extract from Study Guide: "SHA-256 is a widely adopted cryptographic hash function used to verify the integrity of digital data and detect unauthorized modifications." - WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Cryptographic Hash Functions and Data Integrity