An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).

A.
3DES
B.
Diffie-Hellman
C.
CHAP
D.
RIPEMD
E.
RSA
F.
AES-256
G.
SHA-512