A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).

A.
AES
B.
PGP
C.
SHA
D.
MD5
E.
ECDHE
Explanation:
Hashing is used to prove the integrity of data to prove that it hasn’t been modified. Hashing
algorithms are used to derive a key mathematically from a message. The most common hashing
standards for cryptographic applications are the SHA and MD algorithms.