Sara, a forensic invest gator, believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?

A. Compare file sizes from the original with the system image.
B. Reimage the original source with a read-only tool set to ignore errors.
C. Compare hashes of the original source and system image.
D. Compare time stamps from the original with the system image.


Ans: C. Compare hashes of the original source and system image.

Computer Science & Information Technology

You might also like to view...

Words with the same meaning are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Pages created using a CSS Layout have an associated ____________________ file, as shown in the accompanying figure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the output of this line of code, given the following definition?

cout << aNumber (2, 5); // code in main int aNumber (int x, int y) { // function definition return (2 * x - y); } a) -6 b) -1 c) 6 d) 8

Computer Science & Information Technology

In the systems design phase, a logical model is built that describes how the system will be constructed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology