New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 1 Question 10 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 10
Topic #: 1
[All 212-82 Questions]

A text file containing sensitive information about the organization has been leaked and modified to bring down the reputation of the organization. As a safety measure, the organization did contain the MD5 hash of the original file. The file which has been leaked is retained for examining the integrity. A file named "Sensitiveinfo.txt" along with OriginalFileHash.txt has been stored in a folder named Hash in Documents of Attacker Machine-1. Compare the hash value of the original file with the leaked file and state whether the file has been modified or not by selecting yes or no.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Mira
4 months ago
Just compare the hashes, it’s simple math!
upvoted 0 times
...
Youlanda
4 months ago
Hashing is solid, but what if the attacker altered the hash too?
upvoted 0 times
...
Domitila
4 months ago
I’m not so sure, MD5 isn’t foolproof.
upvoted 0 times
...
Shawana
4 months ago
Definitely modified, no doubt about it!
upvoted 0 times
...
Erick
4 months ago
The MD5 hash is a good way to check file integrity.
upvoted 0 times
...
Raelene
5 months ago
I think I recall that we should use a tool to compute the hash of the leaked file and compare it with the one in OriginalFileHash.txt. If they differ, then yes, it’s been modified.
upvoted 0 times
...
Katheryn
5 months ago
I feel a bit confused about MD5's reliability. I know it's not the strongest, but if the hash matches, then the file should be unaltered, right?
upvoted 0 times
...
Jacquelyne
5 months ago
This seems similar to that practice question where we had to check file integrity. I think if the hashes don't match, it means the file was modified.
upvoted 0 times
...
Flo
5 months ago
I remember we practiced comparing hash values in class, but I'm not entirely sure how to do it with MD5 specifically.
upvoted 0 times
...
Elsa
5 months ago
This looks like a straightforward question on storage protocols for VMFS datastores. I'll start by reviewing the options and thinking through which two would be the correct answers.
upvoted 0 times
...
Tien
5 months ago
This seems like a straightforward question about network video products. I'll carefully read through the options and think about why keeping a list of serial numbers could be useful.
upvoted 0 times
...
King
5 months ago
I'm feeling pretty confident about this one. I think the main disadvantage is that the diagram can become significantly larger when changing from a general architecture to a State Machine. That can make it harder to manage and understand.
upvoted 0 times
...
Ronny
5 months ago
I think failures can also depend on material thickness, but I definitely recall the impact transition temperature being really crucial.
upvoted 0 times
...

Save Cancel