Which technology can be used to rate data fidelity and to provide an authenticated hash for data?

Which technology can be used to rate data fidelity and to provide an authenticated hash for data?
A. file reputation
B. file analysis
C. signature updates
D. network blocking

cisco-exams

3 thoughts on “Which technology can be used to rate data fidelity and to provide an authenticated hash for data?

  1. It’s A

    File Reputation queries the database and obtains rating and hash for files. If they are unknown, then they pass to File Analysis.

    1. Based on your own words, B is correct. Your excerpt is basically saying that file reputation just queries the database of ratings and hashes, its file analysis that creates those values in the database.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.