Verifying File Integrity on a Server

Verify File Integrity

Prev Question Next Question

Question

Multiple users report that an application attempting to open a file retrieved from a server reports that the file is corrupted.

Which of the following applications can be used on the server to verify file integrity?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The correct answer is A. Checksum.

Explanation:

Checksum is a method of verifying data integrity by creating a unique string of characters, which is a checksum, from a file or set of files. This checksum can be used to compare against a known good checksum to determine if the file or files have been modified or corrupted.

Using a checksum tool on the server, the administrator can compare the checksum of the file with the known good checksum to determine if the file has been corrupted during transmission or storage. If the checksum values are different, it means that the file has been modified or corrupted, and the administrator can take the appropriate actions to restore the file from a backup or other sources.

Port scanner is a tool used to scan a network to identify open ports and services running on those ports, and it has nothing to do with verifying file integrity.

Cipher is a method of encrypting data to protect it from unauthorized access, and it is not related to file integrity.

Anti-malware software is used to detect and remove malware, such as viruses, trojans, and worms, from a system. It is not a tool to verify file integrity, although some anti-malware tools may perform file integrity checks as part of their scanning process.

In summary, the correct tool to verify file integrity in this scenario is a checksum tool.