A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the most likely protocols used in this script?
A. PGP and MD5
B. ECC and HMAC
C. AES and Twofish
D. MD5 and HMAC
Answer: D. MD5 and HMAC