Multiple users report that an application attempting to open a file retrieved from a server reports that the file is
corrupted. Which of the following applications can be used on the server to verify file integrity?
A.
Checksum
B.
Port scanner
C.
Cipher
D.
Anti-malware