How is the hash value of files useful in network security investigations?
- It is used to decode files.
- It verifies confidentiality of files.
- It is used as a key for encryption.
- It helps identify malware signatures.
Answers Explanation & Hints:
In Sguil, if the cybersecurity analyst is suspicious of a file, the hash value can be submitted to an online site, such as VirusTotal, to determine if the file is known malware. |