You are the security analyst for your company. Management has asked you to provide them with a list of technologies that will provide data integrity. What should you recommend?
A. encryption, steganography, data classifications
B. load balancing, hot site, RAID1
C. ACLs, MAC filters, firewall rules
D. digital signatures, checksums, hashes
D
Explanation: The technologies that will provide data integrity are: digital signatures, checksums, and hashes.
Encryption, steganography, data classifications, ACLs, MAC filters, and firewall rules provide data confidentiality.
Load balancing, hot sites, and RAID1 provide data availability.
You might also like to view...
A ________generally appears at the bottom of slides in a presentation or at the bottom of pages in a handout or on a notes page
A) placeholder B) footer C) footnote D) footing
Fundamental types of data, such as integers and real numbers are known as ____________.
a. fundamental data types b. primitive data types c. natural data types d. basic data types