A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether the file was modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file? A. Check the hash of the installation file. B. Match the file names. C. Verify the URL download location. D. Verify the code signing certificate. Â Correct Answer: A This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer