1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
10

A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from

the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
a. Perform antivirus and anti-malware scans of the file.
b. Perform a hash on the file for comparison with the vendor’s hash.
c. Download the file a second time and compare the version numbers.
d. Compare the hash of the file to the previous firmware update.
Computers and Technology
1 answer:
zhenek [66]3 years ago
5 0

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

You might be interested in
Why would you want to minimize the Ribbon?
Yakvenalex [24]

Answer:

When the Ribbon is minimized, you see only the tabs. There is no way to delete or replace the Ribbon with the toolbars and menus from the earlier versions of Microsoft Office. However, you can minimize the Ribbon to make more space available on your screen.

7 0
3 years ago
Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
CaHeK987 [17]

Answer:

ctrl c

Explanation:

4 0
2 years ago
A three-tier design includes a middle layer between the client and server that processes the client requests and translates them
devlian [24]

Answer:

a. True

Explanation:

The three tiers in a three-tier architecture are:

Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.

Middle Tier: Also called the application tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing.

Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.

5 0
3 years ago
Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
shutvik [7]
I'm not quite sure but it maybe b
6 0
3 years ago
Read 2 more answers
How are special characters added to a Word document? Check all that apply.
MrRissso [65]

It kinda depends on what you mean by special characters

7 0
2 years ago
Read 2 more answers
Other questions:
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    11·2 answers
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    8·1 answer
  • How do I take off the header off my second page in google docs ? ( I only need it on page 1)
    8·2 answers
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn
    6·1 answer
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • The frequencies licensed by telecommunication firms to provide wireless service is known as _____.
    13·1 answer
  • How to identify mistakes in a html code??​
    14·1 answer
  • We love silky. she is very honest join this by using conjunction ​
    11·2 answers
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!