[Solved] Section 4, 35 Hashes

So when checking a HASH to look for corruption or alteration, how are you actually notified of deviation from the original ?

It will be built into the software or protocol that supports the hash. So if you think about Wi-Fi the way the protocol works it does constant HMAC checks. When the check fails it tries again.