How is the hash value of files useful in network security investigations?

IT Questions BankCategory: CCNA CyberOpsHow is the hash value of files useful in network security investigations?

How is the hash value of files useful in network security investigations?

  • It is used to decode files.
  • It helps identify malware signatures.
  • It verifies confidentiality of files.
  • It is used as a key for encryption.

Explanation: When ELSA is used to investigate downloaded files, the hash value of each file is created and stored with other information about the file. If a cybersecurity analyst is suspicious of the file, the hash value can be submitted to an online malware repository site to determine if the file is known malware.

Exam with this question: CCNA Cyber Ops Chapter 12 Exam Answers
Exam with this question: Modules 26 - 28: Analyzing Security Data Group Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x