An organization allows the use of open-source software as long as users perform a file integrity check on the executables and verify the file against hashes of known malware. A user downloads the following files from an open-source website:
After submitting the hashes to the malware registry, the user is alerted that 2f40 3221 33ad 8f34 1032 1adc 13ef 51a4 matches a known malware signature. The organization has been running all of the above software with no known issues. Which of the following actions should the user take and why?
A) Download and run the software but notify the organization's cybersecurity office. The malware registry has a false positive since the software has been running without any issues.
B) Do not run any of the software and notify the organization's cybersecurity office. The open-source website has been compromised, and none of the software can be trusted.
C) Download and run only webserver_82.exe and opendatabase_44.exe and notify the organization's cybersecurity office. Legacy versions of the software have been compromised.
D) Do not run webserver_82.exe and notify the organization's cybersecurity office. The software is malware.
Correct Answer:
Verified
Q622: An organization finds that most help desk
Q623: A network administrator wants to gather information
Q624: A security consultant is analyzing data from
Q625: Which of the following should be implemented
Q626: An organization handling highly confidential information needs
Q628: A user attempts to send an email
Q629: A systems administrator is attempting to recover
Q630: A security analyst receives the following output:
Q631: A security administrator is working with the
Q632: While testing a new application, a developer
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents