You are the security analyst for your company. Management has asked you to provide them with a list of technologies that will provide data integrity. What should you recommend?
A. encryption, steganography, data classifications
B. load balancing, hot site, RAID1
C. ACLs, MAC filters, firewall rules
D. digital signatures, checksums, hashes
D
Explanation: The technologies that will provide data integrity are: digital signatures, checksums, and hashes.
Encryption, steganography, data classifications, ACLs, MAC filters, and firewall rules provide data confidentiality.
Load balancing, hot sites, and RAID1 provide data availability.
You might also like to view...
?A well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project is known as the __________.
Fill in the blank(s) with the appropriate word(s).
_________ are known as last-in, first-out data structures.
Fill in the blank(s) with the appropriate word(s).
A(n) ________ is a line of text that is preceded by a small dot or other symbol
Fill in the blank(s) with correct word
The _________ is the section of a CPU core that performs addition, subtraction, multiplication, and division involving integers and compares two pieces of data to see if they are equal or determining if a specific condition is true or false. A. arithmetic/logic unit B. decimal point unit C. decode unit D. application processor unit
Fill in the blank(s) with the appropriate word(s).