A security administrator finished taking a forensic image of a computer’s memory. Which of the following should the
administrator do to ensure image integrity?
A.
Run the image through AES128.
B.
Run the image through a symmetric encryption algorithm.
C.
Compress the image to a password protected archive.
D.
Run the image through SHA256.
Thank you for the resource. You are correct; you use a SHA256 checksum program to verify that the ISO image that you copied is intact. Many SHA256 checksum programs are available for various operating systems.
please help me in this website from where i can search to the another equation