- It is used to decode files.
- It helps identify malware signatures.
- It verifies confidentiality of files.
- It is used as a key for encryption.
Explanation: When ELSA is used to investigate downloaded files, the hash value of each file is created and stored with other information about the file. If a cybersecurity analyst is suspicious of the file, the hash value can be submitted to an online malware repository site to determine if the file is known malware.
More Questions: CCNA Cyber Ops Chapter 12 Exam Answers
More Questions: Modules 26 – 28: Analyzing Security Data Group Exam