You are the security analyst for your company. Management has asked you to provide them with a list of technologies that will provide data integrity. What should you recommend?

A. encryption, steganography, data classifications
B. load balancing, hot site, RAID1
C. ACLs, MAC filters, firewall rules
D. digital signatures, checksums, hashes


D
Explanation: The technologies that will provide data integrity are: digital signatures, checksums, and hashes.
Encryption, steganography, data classifications, ACLs, MAC filters, and firewall rules provide data confidentiality.
Load balancing, hot sites, and RAID1 provide data availability.

Computer Science & Information Technology

You might also like to view...

?A well-respected manager with a passion to see the project succeed and who removes barriers to the success of the project is known as the __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_________ are known as last-in, first-out data structures.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a line of text that is preceded by a small dot or other symbol

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _________ is the section of a CPU core that performs addition, subtraction, multiplication, and division involving integers and compares two pieces of data to see if they are equal or determining if a specific condition is true or false. A. arithmetic/logic unit B. decimal point unit C. decode unit D. application processor unit

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology