A security specialist has downloaded a free security software tool from a trusted industry site. The
source has published the MD5 hash values for the executable program. The specialist performs a
successful virus scan on the download but the MD5 hash is different. Which of the following steps
should the specialist take?
A.
Re-run the anti-virus program to ensure that it contains no virus execute
B.
Install the executable program because there was probably a mistake with the MD5 value.
C.
Ignore the MD5 hash values because the values can change during IP fragmentation.
D.
Avoid executing the file and contact the source website administrator