PrepAway - Latest Free Exam Questions & Answers

Which of the following can the technician use to verify if a system file was compromised?

A technician wants to verify the authenticity of the system files of a potentially compromised system.
Which of the following can the technician use to verify if a system file was compromised? (Select TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
AES

B.
PGP

C.
SHA

D.
MD5

E.
ECDHE

Explanation:
Hashing is used to prove the integrity of data to prove that it hasn’t been modified. Hashing algorithms
are used to derive a key mathematically from a message. The most common hashing standards for
cryptographic applications are the SHA and MD algorithms.
Incorrect Answers:
A: AES is not a hashing algorithm.
B: PGPis not a hashing algorithm.
E: ECDHE is not a hashing algorithm.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 255, 256


Leave a Reply