Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a
competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity scan.Which of the following could the technician use to prepare the report? (Choose two.)
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
PGP
B.
MD5
C.
ECC
D.
AES
E.
Blowfish
F.
HMAC
Explanation:
B: MD5 can be used to locate the data which has changed.
The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash value is used to
help maintain integrity. There are several versions of MD; the most common are MD5, MD4, and MD2.
F: A common method of verifying integrity involves adding a message authentication code (MAC) to the
message.
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key.