Which of the following can the technician use to verify if a system file was compromised?

A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).

A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).

A.
AES

B.
PGP

C.
SHA

D.
MD5

E.
ECDHE



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen + 17 =