Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
A security analyst is investigating a critical system file that may have been tampered with. How might the analyst verify the integrity of the system file?
- By brute forcing the system file using a rainbow table.
- By comparing the system files hash value to a known, trusted hash value.
- By opening the system file in word processing application and checking its version history.
- By decrypting the system files secret key using Advanced Encryption Standard (AES).