A security analyst is investigating a critical system file that may have been tampered with. How might the analyst verify the integrity of the system file?

Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz | 

A security analyst is investigating a critical system file that may have been tampered with. How might the analyst verify the integrity of the system file?

  • By brute forcing the system file using a rainbow table.
  • By comparing the system files hash value to a known, trusted hash value.
  • By opening the system file in word processing application and checking its version history.
  • By decrypting the system files secret key using Advanced Encryption Standard (AES).

 

Leave a Comment