Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. A security technician was asked to prepare a report of files that had changed since last night's integrity scan. Which of the following could the technician use to prepare the report?

A. PGP
B. MD5
C. ECC
D. AES
E. Blowfish
F. HMAC


Answer:
B. MD5
F. HMAC

Computer Science & Information Technology

You might also like to view...

What are the advantages of ambiguous organizational schemes?

What will be an ideal response?

Computer Science & Information Technology

Which command lists the installed printer drivers available to CUPS?

What will be an ideal response?

Computer Science & Information Technology

In Design view, you can move a selected field by pointing to the Row Selector box and dragging the field until the dark horizontal line displays in the new position

Indicate whether the statement is true or false

Computer Science & Information Technology

Craigslist and LinkedIn are examples of online ________ boards

Fill in the blank(s) with correct word

Computer Science & Information Technology