Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).

A.
PGP
B.
MD5
C.
ECC
D.
AES
E.
Blowfish
F.
HMAC
Dude… why would you need any of these for generating a report? Are you encrypting the report or something maybe but that is not stated!!!!
0
0
Agree completely. What are you hashing? What are you encrypting? Why? This question isn’t written very well.
0
0
i don’t know about encrypting, but hashing can compare files changed since the last integrity scan, assuming that scan got hashes of every file there.
With a list of recently changed files, you can find what the spy was doing immediately before he got the boot.
0
0