Which of the following could the technician use to prepare the report?

Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).

Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).

A.
PGP

B.
MD5

C.
ECC

D.
AES

E.
Blowfish

F.
HMAC



Leave a Reply 3

Your email address will not be published. Required fields are marked *

14 + twelve =


Dude

Dude

Dude… why would you need any of these for generating a report? Are you encrypting the report or something maybe but that is not stated!!!!

Joe

Joe

Agree completely. What are you hashing? What are you encrypting? Why? This question isn’t written very well.

Bob

Bob

i don’t know about encrypting, but hashing can compare files changed since the last integrity scan, assuming that scan got hashes of every file there.

With a list of recently changed files, you can find what the spy was doing immediately before he got the boot.