Verifying the Safety of Downloads

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Q: James is a sales manager for a company. He needs to download software from the Internet. However, the software he wants originates from a site outside of his trusted zone. To be sure that the downloaded software has not been Trojaned, he takes one of the below actions. Which action would make the most sense?

a. James will compare the downloadable version with the one published on the distribution media.

b. James will compare the file’s MD5 signature with the one published on the distribution media.

c. James will compare virus signature to the one published in a distribution.

d. James will compare the software size with the one given online.

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?