A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a
system file was compromised? (Select TWO).

A.
AES
B.
PGP
C.
SHA
D.
MD5
E.
ECDHE