Business Situation
Autor: Sid . • March 2, 2016 • Case Study • 504 Words (3 Pages) • 1,099 Views
MIS 578 Homework 3 FileVerifier++
Question 1 (5 points): Take a screenshot of the FileVerifier++ window in Step 5 and paste it to your report, which should be a Word or RTF file. A file is flagged as “Valid” or “Invalid” depending on whether it has been modified after the hash was created. For HW3 Data files, which file(s) have been modified? List the file names.
[pic 1]
Only one file is been modified after the hash was created:
Cereals.xlsx
Question 2 (5 points): Take a screenshot of the FileVerifier++ window in Step 6 and paste it to your report.
[pic 2]
Question 3 (5 points): Take a screenshot of the FileVerifier++ window in Step 10 and paste it to your report. Are there any files flagged as invalid? Is that what you have expected? Why or why not?
[pic 3]
- There are not files flagged as invalid. I expected the same because I did not modify the files after the hash file was created so all the files will show as valid.
Question 4 (5 points): Take a screenshot of the FileVerifier++ window in Step 12 and paste it to your report. Are there any files flagged as invalid this time? Is that what you have expected? Why or why not?
[pic 4]
The two data file which I modified are flagged as invalid. I expected the same because those two files were modified after the hash file was created so the In FileVerifier++ software showed those files are invalid which means they have been modified after the hash file is created.
Question 5 (5 points): Suppose you need to send a large file to one of your friends in a foreign country and you want to use FileVerifier++ to verify that the file has not been corrupted during the transmission. List the steps that you and your friends will need to take. You can assume that FileVerifier++ has been installed on computers of both of yours.
The steps that me and my friends need to take are:
- I will first create a hash file the file that file I want to send to my friend in a foreign country.
- Then I will cross check the hash file with the FileVerifier++ which is installed in my computer just to cross check if all the file are flagged as valid.
- After FileVerifier++ shows that the file is valid then I will send the file to my friend and notify him to check the file I sent using FileVerifier++ installed in his computer.
- After verifying the file if the verification report is flagged as invalid then it means the file is corrupted which means the file is modified or tampered after it is sent and before it is received by my friend and I will immediately check the connection for and hackers.
- after I'm sure about the connection I all hash the file again and the file to my friend and I do the same until he the file is flagged as valid when verified by my friend.
...