A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?

A. Use TFTP for tested and secure downloads
B. Require biometric authentication for patch updates
C. Provide an MD5 hash for each file
D. Implement a RADIUS authentication


Answer: C. Provide an MD5 hash for each file

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. The concepts of icons, menus and windows were originally developed by Xerox PARC. b. Windows is an open source operating system. c. The software that contains the core components of the operating system is called the kernel. d. Linux source code is available to the public for examination and modification.

Computer Science & Information Technology

The aim of a software process at the ____________, or Level 3, is to create an environment where software managers and technical personnel can do their jobs as effectively as possible.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Denotational semantics are a form of ______ programming language.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?

A. Flash memory B. L1 cache C. firmware D. microcode

Computer Science & Information Technology