Multiple users report that an application attempting to open a file retrieved from a server reports
that the file is corrupted. Which of the following applications can be used on the server to verify file
integrity?
A.
Checksum
B.
Port scanner
C.
Cipher
D.
Anti-malware