A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. Which of the following should be implemented?
Integrity validation ensures that your data hasn’t undergone any unauthorized alterations during transmission or storage. Think of it as a seal on an envelope; any attempt to tamper with the contents would break the seal, signaling interference.
Techniques like hashing can be used to validate the integrity of the data.
I believe C is correct, reason being that
hashing can be used to validate the integrity of the data.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jspecht
Highly Voted 1 year, 2 months agoOdogwu3024
Most Recent 8 months, 4 weeks ago