An attacker used social engineering to gain administrative access to a router, then altered the router image. How can an analyst detect that the router’s image has been altered?
A. by verifying the router’s image digital signature hash
B. by verifying the router’s running configurations
C. by verifying the router’s image creation date
D. by verifying the router’s image version