A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a system file was compromised? (Select TWO).

A. AES B. PGP C. SHA D. MD5 E. ECDHE

Correct Answer: C,D Section: Cryptography

Explanation:
Hashing is used to prove the integrity of data to prove that it hasnâ€™t been modified. Hashing algorithms are used to derive a key mathematically from a message. The most common
hashing standards for cryptographic applications are the SHA and MD algorithms.

Incorrect Answers:
A: AES is not a hashing algorithm.
B: PGPis not a hashing algorithm.
E: ECDHE is not a hashing algorithm.

References:
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, pp. 255, 256