Which of the following methods has MOST likely been used?

A website administrator has received an alert from an application designed to check the integrity of the
company’s website. The alert indicated that the hash value for a particular MPEG file has changed. Upon
further investigation, the media appears to be the same as it was before the alert. Which of the following
methods has MOST likely been used?

A website administrator has received an alert from an application designed to check the integrity of the
company’s website. The alert indicated that the hash value for a particular MPEG file has changed. Upon
further investigation, the media appears to be the same as it was before the alert. Which of the following
methods has MOST likely been used?

A.
Cryptography

B.
Time of check/time of use

C.
Man in the middle

D.
Covert timing

E.
Steganography



Leave a Reply 0

Your email address will not be published. Required fields are marked *