What are the two hashes commonly used for integrity checks?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Boost your Linux skills with the CompTIA Linux+ Certification Exam simulator. Engage with multiple choice questions and detailed feedback. Master Linux concepts and prepare for your exam with confidence!

The commonly used hashes for integrity checks are indeed MD5 and SHA, but it's important to specify which SHA is being referred to since there are several versions (like SHA-1, SHA-256, etc.).

MD5 (Message-Digest algorithm 5) is widely known for its fast computation and is often used for checksums to verify data integrity. However, it has known vulnerabilities and is generally considered less secure for cryptographic applications. Despite this, it remains popular in non-security contexts due to its speed.

SHA (Secure Hash Algorithm) refers to a family of hashing algorithms that include several versions, such as SHA-1 and SHA-256. While SHA-1 is still used, it too has vulnerabilities and has fallen out of favor for security-sensitive applications. SHA-256 and other variants in the SHA-2 family are preferred for their stronger security but may not have been commonly mentioned alongside MD5 in the context of general integrity checks.

Overall, choice B reflects the use of MD5 and a general reference to SHA in popular contexts, aligning with common practices, even if it lacks specificity about which SHA version might be implied.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy