CompTIA Exam Questions

Which of the following are cryptography concepts that should be used to identify the allowed program

An administrator is implementing a security control that only permits the execution of allowed programs.
Which of the following are cryptography concepts that should be used to identify the allowed programs?
(Select two.)

A.
Digital signatures

B.
Hashing

C.
Asymmetric encryption

D.
openID

E.
key escrow