Which of the following could the technician use to prep…

Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a
competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity scan.Which of the following could the technician use to prepare the report? (Choose two.)

Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a
competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity scan.Which of the following could the technician use to prepare the report? (Choose two.)

A.
PGP

B.
MD5

C.
ECC

D.
AES

E.
Blowfish

F.
HMAC

Explanation:
B: MD5 can be used to locate the data which has changed.
The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash value is used to
help maintain integrity. There are several versions of MD; the most common are MD5, MD4, and MD2.
F: A common method of verifying integrity involves adding a message authentication code (MAC) to the
message.
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

17 + 17 =