Question: A security technician runs an automated script every night deigned to detect changes in files. Of the following choices, what are the MOST LIKELY protocols

A security technician runs an automated script every night deigned to detect changes in files. Of the following choices, what are the MOST LIKELY protocols used in this script?
Question 54 options:
a)
PGP and SHA
b)
ECC and HMAC
c)
AES and Twofish
d)
SHA and HMAC hash technology

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!