Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

As a network forensic investigator, you derived 4 files from a suspect TCP stream. Before you open them, you calculated their sha 2 6 5

As a network forensic investigator, you derived 4 files from a suspect TCP stream. Before you open them, you calculated their sha265sum values:
1. cipher1.txt: a998d6d5d4f40ff49b9fed98de90d46cb3c3d12f59b5a98a073b239e6d038bf7
2. enc1.py: c348cccc345024af95f8bf2b390f3a541bf95afb024bd229c151d2ca26e471bb
3..mybashrc: 0a796583109c3a570e20a6e1205582a754bb211e0edf35168e16a2cbd1b1c250
4. cpShrd2pwd: 6fe86238a7010bf0672ed6329e83ec868af7259b9269bda9e2acfb6a3fb1f1a4
Please use the VirusTotal website to verify if they are malicious files.
Group of answer choices
1- False, 2- False, 3- False, 4- False
1- False, 2- False, 3- True, 4- False
1- True, 2- False, 3- False, 4- False
1- False, 2- True, 3- False, 4- False
1- False, 2- False, 3- False, 4- True

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

2nd Edition

1597499471, 978-1597499477

More Books

Students also viewed these Databases questions