How is the hash value of files useful in network security investigations?
- It is used to decode files.
- It helps identify malware signatures.
- It verifies confidentiality of files.
- It is used as a key for encryption.
Explanation: When ELSA is used to investigate downloaded files, the hash value of each file is created and stored with other information about the file. If a cybersecurity analyst is suspicious of the file, the hash value can be submitted to an online malware repository site to determine if the file is known malware.
Exam with this question: CCNA Cyber Ops Chapter 12 Exam Answers
Exam with this question: Modules 26 – 28: Analyzing Security Data Group Exam
Please login or Register to submit your answer