A security administrator finished taking a forensic image of a computer’s memory. Which of the following should the
administrator do to ensure image integrity?
A.
Run the image through AES128.
B.
Run the image through a symmetric encryption algorithm.
C.
Compress the image to a password protected archive.
D.
Run the image through SHA256.
Thank you for the resource. You are correct; you use a SHA256 checksum program to verify that the ISO image that you copied is intact. Many SHA256 checksum programs are available for various operating systems.
0
0
please help me in this website from where i can search to the another equation
0
0