A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the most likely protocols used in this script?

A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the most likely protocols used in this script?




A. PGP and MD5
B. ECC and HMAC
C. AES and Twofish
D. MD5 and HMAC


Answer: D. MD5 and HMAC


Learn More :