Watch this video on YouTube
A security analyst suspects that an update from a third-party vendor includes a backdoor. What command should they use to check the integrity of the downloaded file?