Ask Question

A security specialist is tasked to ensure that files transmitted between the headquarters office and the branch office are not altered during transmission. Which two algorithms can be used to achieve this task

+4
Answers (1)
  1. 15 September, 11:03
    0
    MD5 and SHA-1 can be used to perform this task.

    Explanation:

    MD5 : - MD 5 Algorithm is widely used and has many applications. One of them is to find the data integrity in the file. This algorithm is used to assure that the file has arrived intact. The algorithm is to find the checksum of the file before sending over the server and computing and comparing the both checksum, if both the checksum are equal then the file has arrived intact otherwise not.

    SHA - 1 : - SHA - 1 Algorithm can be used to achieve the task of finding the data integrity of the file. SHA stands for Secure Hash Algorithm. This is a Cryptographic Hash Function. This involves calculation of Digest which is alpha numeric string. This serves as Digital Signature for a file or a piece of data.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A security specialist is tasked to ensure that files transmitted between the headquarters office and the branch office are not altered ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers