A technician is downloading an ISO from a vendor's website.
To ensure the integrity of the download, which of the following should be verified?
A.
File size B.
Vendor URL C.
File hashing D.
Encryption.
C.
A technician is downloading an ISO from a vendor's website.
To ensure the integrity of the download, which of the following should be verified?
A.
File size
B.
Vendor URL
C.
File hashing
D.
Encryption.
C.
When downloading a file, especially software or firmware, it is important to verify the integrity of the download to ensure that the file has not been tampered with, corrupted, or otherwise modified during the download process.
There are several methods for verifying the integrity of a downloaded file, including:
A. File size: The file size should match the size specified by the vendor or the expected size of the file. If the file size is significantly smaller or larger than expected, this may indicate that the download was incomplete or that the file has been modified.
B. Vendor URL: Verifying that the vendor URL is legitimate can help prevent downloading from a fraudulent or malicious website that may distribute modified or corrupted files.
C. File hashing: Hashing is a process that generates a unique code based on the contents of the file. By comparing the hash value of the downloaded file to the hash value provided by the vendor, it is possible to confirm that the file has not been modified during the download process. Popular hashing algorithms include MD5, SHA-1, and SHA-256.
D. Encryption: While encryption can help protect the confidentiality of a file during transmission, it does not provide any guarantees about the integrity of the file.
In summary, the most effective method for ensuring the integrity of a downloaded file is to use file hashing to compare the downloaded file's hash value to the hash value provided by the vendor. This method is more reliable than simply verifying the file size or vendor URL.