Which of the following tools should a cybersecurity analyst use to verify the integrity of a forensic image before and after an investigation?
A. strings
B. sha1sum
C. file
D. dd
E. gzip
Which of the following tools should a cybersecurity analyst use to verify the integrity of a forensic image before and after an investigation?
A. strings
B. sha1sum
C. file
D. dd
E. gzip