Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. A security technician was asked to prepare a report of files that had changed since last night's integrity scan. Which of the following could the technician use to prepare the report?
A. PGP
B. MD5
C. ECC
D. AES
E. Blowfish
F. HMAC
Answer:
B. MD5
F. HMAC
Computer Science & Information Technology
You might also like to view...
What are the advantages of ambiguous organizational schemes?
What will be an ideal response?
Computer Science & Information Technology
Which command lists the installed printer drivers available to CUPS?
What will be an ideal response?
Computer Science & Information Technology
In Design view, you can move a selected field by pointing to the Row Selector box and dragging the field until the dark horizontal line displays in the new position
Indicate whether the statement is true or false
Computer Science & Information Technology
Craigslist and LinkedIn are examples of online ________ boards
Fill in the blank(s) with correct word
Computer Science & Information Technology