Which of the following algorithms is used to verify the integrity of an IOS file?
A) MD5
B) SHA-256
C) TFTP
D) EIGRP
A
Explanation: A) MD5 is a cryptographic hashing algorithm, and it is the one Cisco uses to verify the hash of the files it distributes.
Computer Science & Information Technology
You might also like to view...
The ACK flag is normally sent at the end of the three-way ______________ to indicate that a connection is established.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in the range 0 to 100.
What will be an ideal response?
Computer Science & Information Technology