Which of the following is assured by the use of a hash?
A.
Integrity
B.
Confidentiality
C.
Authentication
D.
Availability
Explanation:
An important application of secure hashes is verification of message integrity. Determining whether any
changes have been made to a message (or a file), for example, can be accomplished by comparing message
digests calculated before, and after, transmission (or any other event).
https://en.wikipedia.org/wiki/
Cryptographic_hash_function#Verifying_the_integrity_of_files_or_messages