Q. A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the most likely protocols used in this script?
A. PGP and MD5
B. ECC and HMAC
C. AES and Twofish
D. MD5 and HMAC
Check out the answer and explanation along with a more complete discussion of hashing here.
For more information on hashing, check out these blog posts.
- Core cryptography conceptsProvides an overview of hashing, encryption, and digital signatures
- Common hashing algorithms
Explains how MD5 and SHA provide integrity
- Hashing concepts
Shows how hashing can verify file integrity
- Creating and comparing hashes
Shows how to use md5sum to create and compare file hashes
- Password attacks
Discusses online and offline password attacks against hashed passwords