Question: A security technician runs an automated script every night deigned to detect changes in files. Of the following choices, what are the MOST LIKELY protocols
A security technician runs an automated script every night deigned to detect changes in files. Of the following choices, what are the MOST LIKELY protocols used in this script?
Question options:
a
PGP and SHA
b
ECC and HMAC
c
AES and Twofish
d
SHA and HMAC hash technology
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
