A network technician downloaded new firmware for the company firewall.
Which of the following should the network technician verify to ensure the downloaded file is correct and complete?
A.
File hash B.
File date C.
File type D.
File size.
A.
A network technician downloaded new firmware for the company firewall.
Which of the following should the network technician verify to ensure the downloaded file is correct and complete?
A.
File hash
B.
File date
C.
File type
D.
File size.
A.
To ensure that the downloaded firmware file is correct and complete, the network technician should verify the file hash.
A file hash is a digital fingerprint of the file that is created using a mathematical algorithm. This fingerprint is unique to the file, and any change in the file, even a single character, will result in a different hash. By verifying the hash, the network technician can confirm that the file has not been altered in any way during the download process and that it matches the hash provided by the vendor.
File date, type, and size can all be useful in verifying a file, but they are not sufficient on their own. File date can be easily manipulated, file type can be spoofed, and file size can vary depending on the compression used. Verifying the file hash provides a more reliable method of ensuring the integrity of the downloaded firmware file.
In summary, the network technician should verify the file hash to ensure that the downloaded firmware file is correct and complete.