CompTIA Exam Questions

Which of the following could the administrator use?

An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).

A.
3DES

B.
Diffie-Hellman

C.
CHAP

D.
RIPEMD

E.
RSA

F.
AES-256

G.
SHA-512