Sara, a security administrator, manually hashes all network device configuration files daily and
compares them to the previous days’ hashes. Which of the following security concepts is Sara
using?

A.
Confidentiality
B.
Compliance
C.
Integrity
D.
Availability
Explanation:
Integrity means the message can’t be altered without detection.