Which of the following algorithms is used to verify the integrity of an IOS file?

A) MD5
B) SHA-256
C) TFTP
D) EIGRP

A
Explanation: A) MD5 is a cryptographic hashing algorithm, and it is the one Cisco uses to verify the hash of the files it distributes.

Computer Science & Information Technology

You might also like to view...

The ACK flag is normally sent at the end of the three-way ______________ to indicate that a connection is established.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in the range 0 to 100.

What will be an ideal response?

Computer Science & Information Technology