Which of the following data protection strategies can be used to confirm file integrity?
A.
Masking
B.
Encryption
C.
Hashing
D.
Obfuscation
The Answer Is:
C
This question includes an explanation.
Explanation:
Hashing (C)is aone-way cryptographic functionthat produces afixed-length digestrepresenting the original data. If the file changes—even by one bit—the hash will change, making it ideal for verifyingdata integrity.
While encryption protectsconfidentiality, and masking/obfuscation protectdata visibility, onlyhashing ensures integrity.