CompTIA Exam Questions

To implement the attack and delay detection, the attack…

An attacker is attempting to insert malicious code into an installer file that is available on the internet. The attacker is able to gain control of the web server that
houses both the installer and the web page which features information about the downloadable file. To implement the attack and delay detection, the attacker
should modify both the installer file and the:

A.
SSL certificate on the web server

B.
The HMAC of the downloadable file available on the website

C.
Digital signature on the downloadable file

D.
MD5 hash of the file listed on the website