A company stores sensitive contract documents in a cloud storage service. To ensure the integrity of these documents over time, which mechanism should be employed?
You selected this option
Encrypting the documents to prevent unauthorized reading of the contents
You selected this option
Using digital signatures to validate the documents have not been modified
You selected this option
Implementing file system permissions to restrict access to the documents
You selected this option
Employing hashing algorithms to generate and compare hashes of the documents
Digital signatures provide a means to verify that the documents have not been changed since the signature was applied. They use cryptographic algorithms to create a unique signature for the content of the document, which can be verified using the signer's public key. If the document content changes after the signature is applied, verification will fail, indicating a potential integrity violation. Hashing algorithms alone cannot tie the integrity check to an identity and do not provide non-repudiation. Encrypting document content protects confidentiality but does not by itself provide a way to verify integrity or detect alterations. File system permissions control access but do not provide a mechanism for ensuring or detecting whether file content remains unmodified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are digital signatures and how do they work?
Open an interactive chat with Bash
What is meant by integrity in the context of documents?
Open an interactive chat with Bash
What are hashing algorithms and how do they differ from digital signatures?