Which of the following would a security administrator use to verify the integrity of a file?
A.
Time stamp
B.
MAC times
C.
File descriptor
D.
Hash
Explanation:
Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash
tables and it is a one-way transformation in order to validate the integrity of data.