kayladawn5141 kayladawn5141 10-01-2024 Computers and Technology contestada a security analyst is investigating a critical system file that may have been tampered with. how might the analyst verify the integrity of the system file?