Posted by: Pdfprep
Post Date: November 16, 2020
An attacker used social engineering to gain administrative access to a router, then altered the router image.
How can an analyst detect that the router’s image has been altered?
A . by verifying the router’s image digital signature hash
B . by verifying the router’s running configurations
C . by verifying the router’s image creation date
D . by verifying the router’s image version
Answer: A
Leave a Reply