A security administrator finished taking a forensic image of a computer’s memory. Which of the following should the administrator do to ensure image integrity?
A.
Run the image through AES128.
B.
Run the image through a symmetric encryption algorithm.
C.
Compress the image to a password protected archive.
D.
Run the image through SHA256.