Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a
competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity scan.Which of the following could the technician use to prepare the report? (Choose two.)
B: MD5 can be used to locate the data which has changed.
The Message Digest Algorithm (MD) creates a hash value and uses a one-way hash. The hash value is used to
help maintain integrity. There are several versions of MD; the most common are MD5, MD4, and MD2.
F: A common method of verifying integrity involves adding a message authentication code (MAC) to the
HMAC (Hash-Based Message Authentication Code) uses a hashing algorithm along with a symmetric key.