1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
10

A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from

the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
a. Perform antivirus and anti-malware scans of the file.
b. Perform a hash on the file for comparison with the vendor’s hash.
c. Download the file a second time and compare the version numbers.
d. Compare the hash of the file to the previous firmware update.
Computers and Technology
1 answer:
zhenek [66]3 years ago
5 0

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

You might be interested in
How can earn more answer from brainly less than two minutes, please
Andrei [34K]
You have to answer other people’s questions.
6 0
3 years ago
A good way to assess your CPU usage is to:_______.
inna [77]
C is likely the best answer here.
8 0
3 years ago
What is Sleep mode? Check all of the boxes that apply.
Liula [17]
Sleep mode (or suspend to RAM) is a low power mode for electronic devices such as computers, televisions, and remote controlled devices. These modes save significantly on electrical consumption compared to leaving a device fully on and, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot. Many devices signify this power mode with a pulsed or red colored LED power light
Hibernation Edit
Main article: Hibernation (computing)
Hibernation, also called Suspend to Disk on Linux, saves all computer operational data on the fixed disk before turning the computer off completely. On switching the computer back on, the computer is restored to its state prior to hibernation, with all programs and files open, and unsaved data intact. In contrast with standby mode, hibernation mode saves the computer's state on the hard disk, which requires no power to maintain, whereas standby mode saves the computer's state in RAM, which requires a small amount of power to maintain.

Hybrid sleep Edit
Sleep mode and hibernation can be combined: the contents of RAM are first copied to non-volatile storage like for regular hibernation, but then, instead of powering down, the computer enters sleep mode. This approach combines the benefits of sleep mode and hibernation: The machine can resume instantaneously, but it can also be powered down completely (e.g. due to loss of power) without loss of data, because it is already effectively in a state of hibernation. This mode is called "hybrid sleep" in Microsoft Windows other than Windows XP.

A hybrid mode is supported by some portable Apple Macintosh computers,[1] compatible hardware running Microsoft Windows Vista or newer, as well as Linux distributions running kernel 3.6 or newer.

ACPI Edit
ACPI (Advanced Configuration and Power Interface) is the current standard for power management, superseding APM (Advanced Power Management) and providing the backbone for sleep and hibernation on modern computers. Sleep mode corresponds to ACPI mode S3. When a non-ACPI device is plugged in, Windows will sometimes disable stand-by functionality for the whole operating system. Without ACPI functionality, as seen on older hardware, sleep mode is usually restricted to turning off the monitor and spinning down the hard drive.
5 0
2 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Terrence smiles at his customers, helps his coworkers, and stays late when needed. What personal skill does Terrence demonstrate
Salsk061 [2.6K]
Friendliness or it shows that he follows the rules
6 0
3 years ago
Read 2 more answers
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • What is the main role of LDAP?
    6·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • When a Python script is running as a standalone program, what will the __name__ variable be set to?
    7·1 answer
  • Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
    12·1 answer
  • Creation of ____________will help you to study the behavior of the real system
    11·1 answer
  • What is first page of website called​
    10·1 answer
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • What are some examples of productions categorized as non-broadcast productions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!