Question No : 7
A technician wants to verify the authenticity of the system files of a potentially compromised system. Which
of the following can the technician use to verify if a system file was compromised? (Select TWO).
A. AES
B. PGP
C. SHA
D. MD5
E. ECDHE
Correct Answer: C, D
No comments:
Post a Comment
Note: only a member of this blog may post a comment.