PrepAway - Latest Free Exam Questions & Answers

To implement the attack and delay detection, the attack…

An attacker is attempting to insert malicious code into an installer file that is available on the internet. The
attacker is able to gain control of the web server that houses both the installer and the web page which features
information about the downloadable file. To implement the attack and delay detection, the attacker should
modify both the installer file and the:

PrepAway - Latest Free Exam Questions & Answers

A.
SSL certificate on the web server

B.
The HMAC of the downloadable file available on the website

C.
Digital signature on the downloadable file

D.
MD5 hash of the file listed on the website


Leave a Reply